❌

Reading view

There are new articles available, click to refresh the page.

Blue Team, Red Team, and Purple Team: An Overview

By Erik Goldoff, Ray Van Hoose, and Max Boehner || Guest Authors This post is comprised of 3 articles that were originally published in the second edition of the InfoSec […]

The post Blue Team, Red Team, and Purple Team: An Overview appeared first on Black Hills Information Security, Inc..

PlumHound Reporting Engine for BloodHoundAD

Kent Ickler // It’s been over two years since Jordan and I talked about a Blue Team’s perspective on Red Team tools.Β Β  A Blue Team’s Perspective on Red Team Hack […]

The post PlumHound Reporting Engine for BloodHoundAD appeared first on Black Hills Information Security, Inc..

Webcast: Enterprise Recon For Purple Teams

Do you know what your attackers know? There’s a good chance you know, but you might not be aware of just how much information can be found historically and in […]

The post Webcast: Enterprise Recon For Purple Teams appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

Red + Blue = Purple

David Fletcher & Sally Vandeven // WeΒ gave a presentation at the GrrConΒ hacker conference in Grand Rapids, MI on October 6, 2016. The presentation was a dialogue meant to illustrate the […]

The post Red + Blue = Purple appeared first on Black Hills Information Security, Inc..

Waiting Is the Hardest Part: A Purple Team’s Take on MS15-034

Mick Douglas // Current Status: – MS15-034 has remote Denial of Service (DoS) – Remote exploit code appears to be ready soon… maybe. Β Stay tuned. BLUE TEAM MARCHING ORDERS: – […]

The post Waiting Is the Hardest Part: A Purple Team’s Take on MS15-034 appeared first on Black Hills Information Security, Inc..

❌