❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Webcast: Attack Tactics 7 – The Logs You Are Looking For

By: BHIS
22 July 2019 at 12:10

Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_AttackTactics7LogsYouAreLookingFor.pdf So we went through an attack in the BHIS Webcast, β€œAttack Tactics 5! Zero to Hero Attack.” Then we went through […]

The post Webcast: Attack Tactics 7 – The Logs You Are Looking For appeared first on Black Hills Information Security, Inc..

WEBCAST: Attack Tactics 3

By: BHIS
10 July 2018 at 10:19

John Strand// For this next installment of our Attack Tactics webcast series, John Strand looks at an environment that had no Active Directory. This is odd, but it’s becoming more […]

The post WEBCAST: Attack Tactics 3 appeared first on Black Hills Information Security, Inc..

PODCAST: Attack Tactics Part 2

John talked about how we’d attack, here’s how you can defend against those attacks. Grab the slides here:Β https://blackhillsinformationsecurity.shootproof.com/gallery/6843799/

The post PODCAST: Attack Tactics Part 2 appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

PODCAST: Attack Tactics Part 1

This is the audio only version of John’s webcast about how we would attack your company during a pentest. Grab his slides here:Β Β https://blackhillsinformationsecurity.shootproof.com/gallery/6843799/

The post PODCAST: Attack Tactics Part 1 appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

WEBCAST: Attack Tactics Part 2

By: BHIS
11 June 2018 at 14:10

John Strand // This is the second part of our series about Attack Tactics, sponsored by our sister company, Active Countermeasures. In the first part we discussed how we’d attack. […]

The post WEBCAST: Attack Tactics Part 2 appeared first on Black Hills Information Security, Inc..

❌
❌