Normal view
MS-DEFCON 3: I wish we had a level 2.5
Are we ready for changes in tech?
-
Black Hills Information Security
- Offensive SPF: How to Automate Anti-Phishing Reconnaissance Using Sender Policy Framework
Offensive SPF: How to Automate Anti-Phishing Reconnaissance Using Sender Policy Framework
![]()
Kent Ickler // TL;DR:Β This post describes the process of building an active system to automatically recon SPF violations. Disclaimer: There are parts of this build that might not be legal [β¦]
The post Offensive SPF: How to Automate Anti-Phishing Reconnaissance Using Sender Policy Framework appeared first on Black Hills Information Security, Inc..
How to Configure SPFv1: Explained for the Masses
![]()
Kent Ickler and Derrick Rauch* // Sun Protection Factor Errβ¦ wait a second. Sender Policy Framework Ladies and Gentlemen of the class of 1997, Wear Sunscreenβ¦I will dispense my advice, [β¦]
The post How to Configure SPFv1: Explained for the Masses appeared first on Black Hills Information Security, Inc..
WEBCAST: Exchange and OWA attacks β Step by Step
![]()
Hereβs our webcast with Beau Bullock, Brian Fehrman & Carrie Roberts from Tuesday, November 29.
The post WEBCAST: Exchange and OWA attacks β Step by Step appeared first on Black Hills Information Security, Inc..
Bypassing Two-Factor Authentication on OWA & Office365 Portals
![]()
Beau Bullock // Full Disclosure:Β Black Hills Information Security believes in responsible disclosure of vulnerabilities. This vulnerability was reported to Microsoft on September 28th, 2016. As of the publication date of [β¦]
The post Bypassing Two-Factor Authentication on OWA & Office365 Portals appeared first on Black Hills Information Security, Inc..
5 Reasons for Mailvelope & Easy Instructions
![]()
Gail Menius // My husband set me up with GPG and Thunderbird and it was too hard. Ethan said it was cool. Lots of people gave it good reviews. Itβs [β¦]
The post 5 Reasons for Mailvelope & Easy Instructions appeared first on Black Hills Information Security, Inc..