❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

AI Large Language Models and Supervised Fine Tuning

By: BHIS
23 January 2025 at 10:00

This blog post is aimed at the intermediate level learner in the fields of data science and artificial intelligence. If you would like to read up on some fundamentals, here […]

The post AI Large Language Models and Supervised Fine Tuning appeared first on Black Hills Information Security, Inc..

Red Teaming: A Story From the Trenches

By: BHIS
18 April 2024 at 13:08

This article originally featured in the very first issue of our PROMPT# zine β€” Choose Wisely. You can find that issue (and all the others) here: https://www.blackhillsinfosec.com/prompt-zine/ I remember a […]

The post Red Teaming: A Story From the Trenches appeared first on Black Hills Information Security, Inc..

Initial Access Operations Part 2: Offensive DevOps

By: BHIS
29 February 2024 at 09:00

The Challenge As stated in PART 1 of this blog, the Windows endpoint defense technology stack in a mature organization represents a challenge for Red Teamer initial access operations. For […]

The post Initial Access Operations Part 2: Offensive DevOps appeared first on Black Hills Information Security, Inc..

Initial Access Operations Part 1: The Windows Endpoint Defense Technology Landscape

By: BHIS
22 February 2024 at 11:00

Today’s endpoint defense landscape on the Windows desktop platform is rich with product offerings of quite sophisticated capabilities. Beyond the world of antivirus products, Extended Detection and Response (XDR), and […]

The post Initial Access Operations Part 1: The Windows Endpoint Defense Technology Landscape appeared first on Black Hills Information Security, Inc..

The DNS over HTTPS (DoH) Mess

15 February 2022 at 14:36

Joff Thyer // I woke up this Monday morning thinking that it’s about time I spent time looking at my Domain Name Service (DNS) configuration in my network. (This thought […]

The post The DNS over HTTPS (DoH) Mess appeared first on Black Hills Information Security, Inc..

Webcast: Shellcode Execution with GoLang

In this Black Hills Information Security (BHIS) webcast, we explore using GoLang to author malware with embedded shellcode. GoLang is a Google-authored modern successor language to C/C++. It is multi-platform, […]

The post Webcast: Shellcode Execution with GoLang appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

Securely Deploying IPv6 in 2020 Part 1: Internet Facing Perimeter

By: BHIS
11 May 2020 at 08:06

Joff Thyer // Introduction If there is anything that the start of 2020 has taught us, it is that Internetworking services are in higher demand than ever before.Β  IPv4 is […]

The post Securely Deploying IPv6 in 2020 Part 1: Internet Facing Perimeter appeared first on Black Hills Information Security, Inc..

Tap Into Your Valuable DNS Data

By: BHIS
3 June 2019 at 11:21

Joff Thyer // The Domain Name System (DNS) is the single most important protocol on the Internet. The distributed architecture of DNS name servers and resolvers has resulted in a […]

The post Tap Into Your Valuable DNS Data appeared first on Black Hills Information Security, Inc..

Pentesting Dropbox on Steroids

By: BHIS
20 November 2018 at 10:34

Joff Thyer// Many of you have probably already looked at Beau Bullock’s fine blog entry on a penetration testing dropbox. Beau has some excellent guidance on how to build the […]

The post Pentesting Dropbox on Steroids appeared first on Black Hills Information Security, Inc..

Embedding Meterpreter in Android APK

By: BHIS
15 October 2018 at 11:52

Joff Thyer// Mobile is everywhere these days. So many applications in our daily life are being migrated towards a cloud deployment whereby the front end technology is back to the […]

The post Embedding Meterpreter in Android APK appeared first on Black Hills Information Security, Inc..

Got Privs? Crack Those Hashes!

By: BHIS
3 May 2018 at 11:06

Joff Thyer // Black Hills Information Security loves performing both internal penetration tests, as well as command and control testing for our customers. Thanks to the efforts of many great […]

The post Got Privs? Crack Those Hashes! appeared first on Black Hills Information Security, Inc..

Are You Really Hacking Naked?

By: BHIS
12 October 2017 at 11:01

Joff Thyer // I had an interesting experience recently that reminded me to always β€œtrust but verify.” Let me set the stage for you. As a penetration tester, and IT […]

The post Are You Really Hacking Naked? appeared first on Black Hills Information Security, Inc..

❌
❌