❌

Reading view

There are new articles available, click to refresh the page.

PODCAST: Sacred Cash Cow Tipping 2019

Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, β€œWhy do these endpoint security bypass techniques still work? Why?” The goal of this is to […]

The post PODCAST: Sacred Cash Cow Tipping 2019 appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

Webcast: Sacred Cash Cow Tipping 2019

John Strand // Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, β€œWhy do these endpoint security bypass techniques still work? Why?” The goal of […]

The post Webcast: Sacred Cash Cow Tipping 2019 appeared first on Black Hills Information Security, Inc..

Treating Antivirus as β€œThe Gold Standard”

Jordan Drysdale // Sacred Cash Cow Tipping Webcast 2018 follow-up The great Kaspersky Internet Security 2017 antivirus product lived up to and met all of my expectations in testing, so […]

The post Treating Antivirus as β€œThe Gold Standard” appeared first on Black Hills Information Security, Inc..

A Morning with Cobalt Strike & Symantec

Joff Thyer // If you have been penetration testing a while, you likely have ended up in a Red Team situation or will be engaged in it soon enough. From […]

The post A Morning with Cobalt Strike & Symantec appeared first on Black Hills Information Security, Inc..

Bypassing Cylance: Part 5 – Looking Forward

John Strand// We just finished up a walk through of how we bypassed Cylance in a previous engagement. To conclude this exciting week, I want to share a few comments […]

The post Bypassing Cylance: Part 5 – Looking Forward appeared first on Black Hills Information Security, Inc..

Bypassing Cylance: Part 4 – Metasploit Meterpreter & PowerShell Empire Agent

David Fletcher // The following techniques serve to illustrate methods for obtaining C2 communication in a particular Cylance protected environment. Β The configuration of the centralized infrastructure and the endpoint agents […]

The post Bypassing Cylance: Part 4 – Metasploit Meterpreter & PowerShell Empire Agent appeared first on Black Hills Information Security, Inc..

Bypassing Cylance: Part 3 – Netcat & Nishang ICMP C2 Channel

David Fletcher // The following techniques serve to illustrate methods for obtaining C2 communication in a particular Cylance protected environment. Β The configuration of the centralized infrastructure and the endpoint agents […]

The post Bypassing Cylance: Part 3 – Netcat & Nishang ICMP C2 Channel appeared first on Black Hills Information Security, Inc..

Bypassing Cylance: Part 2 – Using DNSCat2

David Fletcher // The following techniques serve to illustrate methods for obtaining C2 communication in a particular Cylance protected environment.Β  The configuration of the centralized infrastructure and the endpoint agents […]

The post Bypassing Cylance: Part 2 – Using DNSCat2 appeared first on Black Hills Information Security, Inc..

Bypassing Cylance: Part 1 – Using VSAgent.exe

David Fletcher // Recently, we had the opportunity to test a production Cylance environment. Obviously, each environment is going to be different and the efficacy of security controls relies largely […]

The post Bypassing Cylance: Part 1 – Using VSAgent.exe appeared first on Black Hills Information Security, Inc..

How to Bypass Anti-Virus to Run Mimikatz

Carrie Roberts // * Would you like to run Mimikatz without Anti-Virus (AV) detecting it? Recently I attempted running the PowerShell script β€œInvoke-Mimikatz” from PowerSploitΒ on my machine but it was […]

The post How to Bypass Anti-Virus to Run Mimikatz appeared first on Black Hills Information Security, Inc..

How to Bypass Application Whitelisting & AV

Brian Fehrman // There are numerous methods that have been published to bypass Anti-Virus products. As a result, many companies are beginning to realize that application whitelisting is another tool […]

The post How to Bypass Application Whitelisting & AV appeared first on Black Hills Information Security, Inc..

Click to Enable Content

Sally Vandeven // Evading anti-virus scanners has become a bit of a sport around BHIS. Β When we do C2 testing for our customers we start with a host on the […]

The post Click to Enable Content appeared first on Black Hills Information Security, Inc..

❌