❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Getting Started with AI Hacking: Part 1

By: BHIS
2 April 2025 at 10:00

Getting Started with AI Hacking

You may have read some of our previous blog posts on Artificial Intelligence (AI). We discussed things like using PyRIT to help automate attacks. We also covered the dangers of […]

The post Getting Started with AI Hacking: Part 1 appeared first on Black Hills Information Security, Inc..

PowerShell w/o PowerShell Simplified

By: BHIS
1 March 2018 at 10:29

Brian Fehrman // In a previous post, titled PowerShell without PowerShell, we showed you how you can bypass Application Whitelisting Software (AWS), PowerShell restrictions/monitoring, and Command Prompt restrictions. In some […]

The post PowerShell w/o PowerShell Simplified appeared first on Black Hills Information Security, Inc..

WEBCAST: A Powerful New Tool – PowerLine!

By: BHIS
15 June 2017 at 10:38

Brian Fehrman // Running into environments where the use of PowerShell is being monitored or is just flat-out disabled? Have you tried out the fantastic PowerOps framework but are wishing […]

The post WEBCAST: A Powerful New Tool – PowerLine! appeared first on Black Hills Information Security, Inc..

Power Posing with PowerOPS

By: BHIS
25 January 2017 at 11:13

Brian FehrmanΒ // As described in my last blog post,Β Powershell Without Powershell – How To Bypass Application Whitelisting, Environment Restrictions & AVΒ (sheeesh…it’s been a bit!), we are seeing more environments in […]

The post Power Posing with PowerOPS appeared first on Black Hills Information Security, Inc..

Wide-Spread Local Admin Testing

By: BHIS
13 June 2016 at 12:14

Brian Fehrman // In our experience, we see many Windows environments in which the local Administrator password is the same for many machines. We refer to this as Wide-Spread Local […]

The post Wide-Spread Local Admin Testing appeared first on Black Hills Information Security, Inc..

How to Bypass Application Whitelisting & AV

By: BHIS
20 April 2016 at 11:41

Brian Fehrman // There are numerous methods that have been published to bypass Anti-Virus products. As a result, many companies are beginning to realize that application whitelisting is another tool […]

The post How to Bypass Application Whitelisting & AV appeared first on Black Hills Information Security, Inc..

EyeWitness and Why It Rocks

By: BHIS
22 February 2016 at 17:02

Brian Fehrman // External and Internal vulnerability scans are often part of any penetration test. Automated scanning tools, however, can’t always find the β€œgood stuff.” Many times, some of the […]

The post EyeWitness and Why It Rocks appeared first on Black Hills Information Security, Inc..

❌
❌