❌

Reading view

There are new articles available, click to refresh the page.

Augmenting Security Testing and Analysis Activities with Microsoft 365 Products

Use of Microsoft 365 products in security testing is not a new concept. For a long time, I’ve incorporated various activities using Office products into my testing regimen. In the […]

The post Augmenting Security Testing and Analysis Activities with Microsoft 365 Products appeared first on Black Hills Information Security, Inc..

Your Reporting Matters: How to Improve Pen Test Reporting

Brian B. KingΒ // This is a companion post to BBKing’s β€œHack for Show, Report for Dough” report, given at BSides Cleveland in June 2019. The fun part of pentesting is […]

The post Your Reporting Matters: How to Improve Pen Test Reporting appeared first on Black Hills Information Security, Inc..

How to Get Malicious Macros Past Email Filters

Carrie Roberts // Β  Β  Β  A malicious macro in a Microsoft Word or Excel document is an effective hacking technique. These documents could be delivered in a variety of […]

The post How to Get Malicious Macros Past Email Filters appeared first on Black Hills Information Security, Inc..

Click to Enable Content

Sally Vandeven // Evading anti-virus scanners has become a bit of a sport around BHIS. Β When we do C2 testing for our customers we start with a host on the […]

The post Click to Enable Content appeared first on Black Hills Information Security, Inc..

Using Simple Burp Macros to Automate Testing

David Fletcher // Recently, while assessing a web application I noticed content on one of the pages that appeared to be derived from sensitive information stored within the site’s user […]

The post Using Simple Burp Macros to Automate Testing appeared first on Black Hills Information Security, Inc..

❌