❌

Reading view

There are new articles available, click to refresh the page.

Ssh… Don’t Tell Them I Am Not HTTPS: How Attackers Use SSH.exe as a Backdoor Into Your Network

Derek Banks // Living Off the Land Binaries, Scripts, and Libraries, known as LOLBins or LOLBAS, are legitimate components of an operating system that threat actors can use to achieve […]

The post Ssh… Don’t Tell Them I Am Not HTTPS: How Attackers Use SSH.exe as a Backdoor Into Your Network appeared first on Black Hills Information Security, Inc..

Digital Bug Out Bag: A Nerd and His Family Running From a Hurricane

Derek Banks// I live in an area that was initially projected to be hit by Hurricane Florence. Four days prior to the storm making landfall the governor of my state […]

The post Digital Bug Out Bag: A Nerd and His Family Running From a Hurricane appeared first on Black Hills Information Security, Inc..

End-Point Log Consolidation with Windows Event Forwarder

Derek Banks // I want to expand on our previous blog post on consolidated endpoint event logging and use Windows Event Forwarding and live off the Microsoft land for shipping […]

The post End-Point Log Consolidation with Windows Event Forwarder appeared first on Black Hills Information Security, Inc..

How To Do Endpoint Monitoring on a Shoestring Budget – Webcast Write-Up

Joff Thyer & Derek Banks // Editor’s Note: This is a more in-depth write-up based on the webcast which can be watched here. As penetration testers, we often find ourselves […]

The post How To Do Endpoint Monitoring on a Shoestring Budget – Webcast Write-Up appeared first on Black Hills Information Security, Inc..

WEBCAST: How To Do Consolidated Endpoint Monitoring on a Shoestring Budget

Derek Banks & Joff Thyer // If you’re not currently logging and monitoring the Windows endpoints on the edge of your network you are missing valuable information that is not […]

The post WEBCAST: How To Do Consolidated Endpoint Monitoring on a Shoestring Budget appeared first on Black Hills Information Security, Inc..

You Down With APP? (Yeah You Know Me)

Derek Banks // Yes, I date myself with reference in the title of this blog post. Β I can be lame like that. A fair amount of my time at $last_gig […]

The post You Down With APP? (Yeah You Know Me) appeared first on Black Hills Information Security, Inc..

Developing Hacking Kung Fu (or How To Get Into Information Security)

Derek Banks // Β  More than occasionally I am asked how to get into Information Security as a profession. Β  AsΒ attacks and breaches continue to escalate in frequency the demand […]

The post Developing Hacking Kung Fu (or How To Get Into Information Security) appeared first on Black Hills Information Security, Inc..

❌