❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Default Web Content

By: BHIS
3 September 2025 at 10:00

Whether it's forgotten temporary files, installation artifacts, READMEs, or even simple image files--default content on web servers can turn into a boon for attackers. In the most innocent of cases, these types of content can let attackers know more about the tech stack of the environment, and in the worst case scenario can lead to exploitation.

The post Default Web Content appeared first on Black Hills Information Security, Inc..

DNS Triage Cheatsheet

By: BHIS
6 August 2025 at 11:00

DNS Triage is a reconnaissance tool that finds information about an organization's infrastructure, software, and third-party services as fast as possible. The goal of DNS Triage is not to exhaustively find every technology asset that exists on the internet. The goal is to find the most commonly abused items of interest for real attackers.

The post DNS Triage Cheatsheet appeared first on Black Hills Information Security, Inc..

CredMaster Cheatsheet

By: BHIS
6 August 2025 at 11:00

CredMaster is a tool that facilitates password guessing attacks against common targets. It is designed with evasion and anti-detection capabilities and uses AWS APIs to rotate IP addresses for each guess.

The post CredMaster Cheatsheet appeared first on Black Hills Information Security, Inc..

Burp Suite Cheatsheet

By: BHIS
6 August 2025 at 11:00

Burp Suite is an intercepting HTTP proxy that can also scan a web-based service for vulnerabilities. A tool like this is indispensable for testing web applications. Burp Suite is written in Java and comes bundled with a JVM, so it works on any operating system you're likely to use.

The post Burp Suite Cheatsheet appeared first on Black Hills Information Security, Inc..

Vulnerability Scanning with NmapΒ 

By: BHIS
16 July 2025 at 10:00

Nmap, also known as Network Mapper, is a commonly used network scanning tool. As penetration testers, Nmap is a tool we use daily that is indispensable for verifying configurations and identifying potential vulnerabilities.

The post Vulnerability Scanning with NmapΒ  appeared first on Black Hills Information Security, Inc..

How to Use Dirsearch

By: BHIS
2 July 2025 at 10:00

Dirsearch is an open-source multi-threaded β€œweb path discovery” tool first released in 2014. The program, written in Python, is similar to other tools such as Dirbuster or Gobuster, and aims to quickly find hidden content on web sites.

The post How to Use Dirsearch appeared first on Black Hills Information Security, Inc..

Why Use a Macro Pad?

By: BHIS
4 June 2025 at 10:00

Compression is everywhereβ€”in files, videos, storage, and networksβ€”so it’s only natural it should also be in your workflow too. You can β€œcompress” a series of tedious, repetitive tasks requiring multiple steps and several configurations into a single button press with a macro pad such as the Stream Deck or a fully software-customizable mechanical keyboard.Β 

The post Why Use a Macro Pad? appeared first on Black Hills Information Security, Inc..

Caging Copilot: Lessons Learned in LLM Security

For those of us in cybersecurity, there are a lot of unanswered questions and associated concerns about integrating AI into these various products. No small part of our worries has to do with the fact that this is new technology, and new tech always brings with it new security issues, especially technology that is evolving as quickly as AI.

The post Caging Copilot: Lessons Learned in LLM Security appeared first on Black Hills Information Security, Inc..

Burp Suite Extension: Copy ForΒ 

By: BHIS
6 March 2025 at 11:06

If you’ve ever had to take a request from Burp and turn it into a command line, especially for jwt_tool.py, you know it can be painfulβ€”but no more! The β€œCopy For” extension is here to save valuable time.Β 

The post Burp Suite Extension: Copy ForΒ  appeared first on Black Hills Information Security, Inc..

❌
❌