❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Detecting ADCS Privilege Escalation

By: BHIS
23 July 2025 at 09:31

Active Directory Certificate Services (ADCS) is used to manage certificates for systems, users, applications, and more in an enterprise environment. Misconfigurations in ADCS can introduce critical vulnerabilities into an enterprise Active Directory environment.

The post Detecting ADCS Privilege Escalation appeared first on Black Hills Information Security, Inc..

Vulnerability Scanning with NmapΒ 

By: BHIS
16 July 2025 at 10:00

Nmap, also known as Network Mapper, is a commonly used network scanning tool. As penetration testers, Nmap is a tool we use daily that is indispensable for verifying configurations and identifying potential vulnerabilities.

The post Vulnerability Scanning with NmapΒ  appeared first on Black Hills Information Security, Inc..

Go-Spoof: A Tool for Cyber Deception

By: BHIS
27 March 2025 at 10:00

Go-Spoof brings an old tool to a new language. The Golang rewrite [of Portspoof] provides similar efficiency and all the same features of the previous tool but with easier setup and useability.

The post Go-Spoof: A Tool for Cyber Deception appeared first on Black Hills Information Security, Inc..

Why Your Org Needs a Penetration Test Program

By: BHIS
10 March 2025 at 11:30

This webcast originally aired on February 27, 2025. Join us for a very special free one-hour Black Hills Information Security webcast with Corey Ham & Kelli Tarala on why your […]

The post Why Your Org Needs a Penetration Test Program appeared first on Black Hills Information Security, Inc..

Proxying Your Way to Code Execution – A Different Take on DLL HijackingΒ 

By: BHIS
26 September 2024 at 11:00

While DLL hijacking attacks can take on many different forms, this blog post will explore a specific type of attack called DLL proxying, providing insights into how it works, the potential risks it poses, and briefly the methodology for discovering these vulnerable DLLs, which led to the discovery of several zero-day vulnerable DLLs that Microsoft has acknowledged but opted to not fix at this time.

The post Proxying Your Way to Code Execution – A Different Take on DLL HijackingΒ  appeared first on Black Hills Information Security, Inc..

Abusing Active Directory Certificate Services (Part 4)

By: BHIS
30 May 2024 at 11:31

Start this blog series from the beginning here: PART 1 Misconfigurations in Active Directory Certificate Services (ADCS) can introduce critical vulnerabilities into an Enterprise environment. In this article, we will […]

The post Abusing Active Directory Certificate Services (Part 4) appeared first on Black Hills Information Security, Inc..

Deploy an Active Directory Lab Within Minutes

By: BHIS
25 April 2024 at 11:00

Creating your own lab can sound like a daunting task. By the end of this blog post, you will be able to deploy your own Active Directory (AD) environment in […]

The post Deploy an Active Directory Lab Within Minutes appeared first on Black Hills Information Security, Inc..

Wishing: Webhook Phishing in Teams

By: BHIS
14 March 2024 at 09:10

Quick Jump: In the constantly evolving landscape of cybersecurity, it is common to see features designed for convenience lead to negative cybersecurity consequences. Microsoft Teams, an essential tool for corporate […]

The post Wishing: Webhook Phishing in Teams appeared first on Black Hills Information Security, Inc..

Hacking with Hydra

By: BHIS
15 February 2024 at 12:00

What is Hydra? Hydra is a tool that can be used for password spraying. Let’s begin by defining the term β€œpassword spray.” A password spray is where an attacker defines […]

The post Hacking with Hydra appeared first on Black Hills Information Security, Inc..

Abusing Active Directory Certificate Services (Part 2)

By: BHIS
12 October 2023 at 11:44

Misconfigurations in Active Directory Certificate Services (ADCS) can introduce critical vulnerabilities into an Enterprise Active Directory environment, such as paths of escalation from low privileged accounts to domain administrator.

The post Abusing Active Directory Certificate Services (Part 2) appeared first on Black Hills Information Security, Inc..

Abusing Active Directory Certificate Services (Part 1)

By: BHIS
5 October 2023 at 12:00

Active Directory Certificate Services (ADCS) is used for public key infrastructure in an Active Directory environment. ADCS is widely used in enterprise Active Directory environments for managing certificates for systems, users, applications, and more.

The post Abusing Active Directory Certificate Services (Part 1) appeared first on Black Hills Information Security, Inc..

Evasive File Smuggling with SkyhookΒ 

By: BHIS
15 June 2023 at 09:20

ImposterKeanu // IntroductionΒ  This blog post introduces the reader to β€œThe Obfuscation Hustle”, a term I enjoy using to describe the tedious process of obfuscating and delivering files to corporate […]

The post Evasive File Smuggling with SkyhookΒ  appeared first on Black Hills Information Security, Inc..

Gowitness, a Tester’s Time Saver

16 February 2023 at 13:30

Alyssa Snow // During an external or internal network penetration test, it can be challenging to comb through each web server in scope to find the juicy stuff. During a […]

The post Gowitness, a Tester’s Time Saver appeared first on Black Hills Information Security, Inc..

❌
❌