❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Bypassing WAFs Using Oversized Requests

By: BHIS
15 October 2025 at 10:00

Many web application firewalls (WAFs) can be bypassed by simply sending large amounts of extra data in the request body along with your payload. Most WAFs will only process requests up to a certain size limit. How the WAF is configured to handle these large requests determines exploitability, but some common WAFs will allow it by default.

The post Bypassing WAFs Using Oversized Requests appeared first on Black Hills Information Security, Inc..

Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 3: Arcanum Cyber Security Bot

By: BHIS
25 June 2025 at 10:00

In my journey to explore how I can use artificial intelligence to assist in penetration testing, I experimented with a security-focused chat bot created by Jason Haddix called Arcanum Cyber Security Bot (available on https://chatgpt.com/gpts). Jason engineered this bot to leverage up-to-date technical information related to application security and penetration testing.

The post Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 3: Arcanum Cyber Security Bot appeared first on Black Hills Information Security, Inc..

What Is Penetration Testing?

By: BHIS
7 November 2024 at 10:00

In today’s world, security is more important than ever. As organizations increasingly rely on technology to drive business, digital threats are becoming more sophisticated, varied, and difficult to defend against. […]

The post What Is Penetration Testing? appeared first on Black Hills Information Security, Inc..

Start to Finish: Configuring an Android Phone for Pentesting

Jeff Barbi // *Guest Post Background Unless you’re pentesting mobile apps consistently, it’s easy for your methodologies to fall out of date. Each new version of Android brings with it […]

The post Start to Finish: Configuring an Android Phone for Pentesting appeared first on Black Hills Information Security, Inc..

What You Should Actually Learn From a Pentest Report

By: BHIS
27 January 2020 at 10:13

Dakota Nelson // Unknown Unknowns: So you’ve been pentested. Congrats! It might not feel like it, but this will eventually leave you more confident about your security, not less. The […]

The post What You Should Actually Learn From a Pentest Report appeared first on Black Hills Information Security, Inc..

DOs and DON’Ts of Pentest Report Writing

By: BHIS
23 August 2018 at 10:13

Melisa Wachs// The first day of school has started for your school-age kiddos. What better time to run through some of our basic reporting guidelines with y’all? Here is a […]

The post DOs and DON’Ts of Pentest Report Writing appeared first on Black Hills Information Security, Inc..

WEBCAST: Testing G Suites with MailSniper

By: BHIS
18 June 2018 at 09:47

Matthew Toussain// Join Matt Toussain as he talks about Mailsniper, a tool written by our very own Beau Bullock. Wouldn’t you like to START your pen tests knowing every username […]

The post WEBCAST: Testing G Suites with MailSniper appeared first on Black Hills Information Security, Inc..

PODCAST: Attack Tactics Part 1

This is the audio only version of John’s webcast about how we would attack your company during a pentest. Grab his slides here:Β Β https://blackhillsinformationsecurity.shootproof.com/gallery/6843799/

The post PODCAST: Attack Tactics Part 1 appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

What to Expect from a Vulnerability Scan

By: BHIS
12 April 2018 at 11:53

Dakota Nelson// For a lot of our customers, their first introduction to pentesting is a vulnerability scan from BHIS. This is after talking to the testers, of course, and setting […]

The post What to Expect from a Vulnerability Scan appeared first on Black Hills Information Security, Inc..

New Toy Alert: A Quick Review of Keysy

By: BHIS
5 April 2018 at 11:47

Rick Wisser// Here at BHIS we are always on the lookout for new toys. Especially if we can use them during a pentest. As a pentester, we all have a […]

The post New Toy Alert: A Quick Review of Keysy appeared first on Black Hills Information Security, Inc..

Performing a Physical Pentest? Bring This!

By: BHIS
13 December 2017 at 11:12

Jordan Drysdale// Physical Pentest Upcoming? Bring a Badgy. While badge reproduction may not be the intended use of this product, if you are a physical tester and you don’t own […]

The post Performing a Physical Pentest? Bring This! appeared first on Black Hills Information Security, Inc..

WEBCAST: CredDefense Toolkit

By: BHIS
4 October 2017 at 10:16

Beau Bullock, Brian Fehrman, & Derek Banks // Pentesting organizations as your day-to-day job quickly reveals commonalities among environments. Although each test is a bit unique, there’s a typical path […]

The post WEBCAST: CredDefense Toolkit appeared first on Black Hills Information Security, Inc..

❌
❌