❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Offline Memory Forensics With Volatility

By: BHIS
8 April 2025 at 10:00

Volatility is a memory forensics tool that can pull SAM hashes from a vmem file. These hashes can be used to escalate from a local user or no user to a domain user leading to further compromise.

The post Offline Memory Forensics With Volatility appeared first on Black Hills Information Security, Inc..

Go-Spoof: A Tool for Cyber Deception

By: BHIS
27 March 2025 at 10:00

Go-Spoof brings an old tool to a new language. The Golang rewrite [of Portspoof] provides similar efficiency and all the same features of the previous tool but with easier setup and useability.

The post Go-Spoof: A Tool for Cyber Deception appeared first on Black Hills Information Security, Inc..

How to Hack Wi-Fi with No Wi-Fi

By: BHIS
17 March 2025 at 11:00

In this video, John Strand and his team discuss the challenges of setting up and running wireless labs, particularly focusing on the issues faced during Wild West Hackin’ Fest events. They highlight the development of an open-source project aimed at virtualizing wireless labs, which allows learners to practice wireless hacking techniques without needing physical hardware.

The post How to Hack Wi-Fi with No Wi-Fi appeared first on Black Hills Information Security, Inc..

Wi-Fi Forge: Practice Wi-Fi Security Without HardwareΒ 

By: BHIS
27 February 2025 at 10:00

In the world of cybersecurity, it’s important to understand what attack surfaces exist. The best way to understand something is by first doing it. Whether you’re an aspiring penetration tester, […]

The post Wi-Fi Forge: Practice Wi-Fi Security Without HardwareΒ  appeared first on Black Hills Information Security, Inc..

❌
❌