❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Wrangling Windows Event Logs with Hayabusa & SOF-ELK (Part 2)

By: BHIS
1 October 2025 at 10:00

But what if we need to wrangle Windows Event Logs for more than one system? In part 2, we’ll wrangle EVTX logs at scale by incorporating Hayabusa and SOF-ELK into my rapid endpoint investigation workflow (β€œREIW”)!Β 

The post Wrangling Windows Event Logs with Hayabusa & SOF-ELK (Part 2) appeared first on Black Hills Information Security, Inc..

Wrangling Windows Event Logs with Hayabusa & SOF-ELKΒ (Part 1)

By: BHIS
17 September 2025 at 10:09

In part 1 of this post, we’ll discuss how Hayabusa and β€œSecurity Operations and Forensics ELK” (SOF-ELK) can help us wrangle EVTX files (Windows Event Log files) for maximum effect during a Windows endpoint investigation!

The post Wrangling Windows Event Logs with Hayabusa & SOF-ELKΒ (Part 1) appeared first on Black Hills Information Security, Inc..

Stop Spoofing Yourself! Disabling M365 Direct Send

By: BHIS
20 August 2025 at 10:00

Remember the good β€˜ol days of Zip drives, Winamp, the advent of β€œOffice 365,” and copy machines that didn’t understand email authentication? Okay, maybe they weren’t so good! For a […]

The post Stop Spoofing Yourself! Disabling M365 Direct Send appeared first on Black Hills Information Security, Inc..

Questions From a Beginner Threat Hunter

By: BHIS
30 January 2025 at 10:00

Answered by Chris Brenton of Active Countermeasures | Questions compiled from the infosec community by Shelby Perry This article was originally published in the Threat Hunting issue of our infosec […]

The post Questions From a Beginner Threat Hunter appeared first on Black Hills Information Security, Inc..

The Azure Sandbox – Purple EditionΒ 

By: BHIS
8 February 2022 at 09:21

Jordan Drysdale // Azure has replaced AWS in my personal development pipeline. This may sound crazy but hear me out. Microsoft has solidified its offerings, done nothing but improve its […]

The post The Azure Sandbox – Purple EditionΒ  appeared first on Black Hills Information Security, Inc..

Let’s Go Hunting! How to Hunt Command & Control Channels Using Bro IDS and RITA

By: BHIS
13 September 2017 at 10:55

Logan Lembke// Here at BHIS, we β™₯ Bro IDS. Imagine… Bro IDS Everywhere! If you haven’t encountered Bro IDS before, checkout thisΒ webcastΒ on John’s Youtube channel discussing the need for Bro […]

The post Let’s Go Hunting! How to Hunt Command & Control Channels Using Bro IDS and RITA appeared first on Black Hills Information Security, Inc..

WEBCAST: RITA

By: BHIS
27 February 2017 at 11:54

John Strand // Want to get started on a hunt team and discover β€œbad things” on your network? In this webcast, we will walk through the installation and usage of […]

The post WEBCAST: RITA appeared first on Black Hills Information Security, Inc..

WEBCAST: Live Forensics & Memory Analysis

By: BHIS
20 January 2017 at 12:38

John Strand // So you think you might have a compromised Windows system. If you do, where do you start? How would you review the memory of that system? What […]

The post WEBCAST: Live Forensics & Memory Analysis appeared first on Black Hills Information Security, Inc..

Hacking Like It’s 1999

By: BHIS
28 January 2016 at 17:39

Lawrence Hoffman // Last week a friend stopped by my desk with a worried look on his face. He knelt down and showed me the screen of his laptop where […]

The post Hacking Like It’s 1999 appeared first on Black Hills Information Security, Inc..

❌
❌