❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Getting PowerShell Empire Past Windows Defender

By: BHIS
15 February 2019 at 17:03

Carrie Roberts //* (Updated 2/12/2020) ADVISORY: The techniques and tools referenced within this blog post may be outdated and do not apply to current situations. However, there is still potential […]

The post Getting PowerShell Empire Past Windows Defender appeared first on Black Hills Information Security, Inc..

PowerShell w/o PowerShell Simplified

By: BHIS
1 March 2018 at 10:29

Brian Fehrman // In a previous post, titled PowerShell without PowerShell, we showed you how you can bypass Application Whitelisting Software (AWS), PowerShell restrictions/monitoring, and Command Prompt restrictions. In some […]

The post PowerShell w/o PowerShell Simplified appeared first on Black Hills Information Security, Inc..

Are You Spying on me? Detecting SSL Man-in-the-Middle

By: BHIS
8 February 2018 at 10:35

Carrie Roberts//* Is your employer reading all your sensitive information when you browse the internet from your work computer? Probably. But how can you be sure? It is common for […]

The post Are You Spying on me? Detecting SSL Man-in-the-Middle appeared first on Black Hills Information Security, Inc..

Empire Resource Files and Auto Runs

By: BHIS
26 October 2017 at 10:00

Carrie Roberts* // I have added resource file and autorun functionality to PowerShell Empire. Empire now has the ability to run multiple commands at once by specifying the commands in […]

The post Empire Resource Files and Auto Runs appeared first on Black Hills Information Security, Inc..

Grepping Through PowerView Output

By: BHIS
18 October 2017 at 11:13

Carrie Roberts//* Have you found yourself trying to Grep through PowerView output, or any PowerShell output for that matter, and find that it returns no results for text you know […]

The post Grepping Through PowerView Output appeared first on Black Hills Information Security, Inc..

How To: Empire’s Cross Platform Office Macro

By: BHIS
7 August 2017 at 09:57

David Fletcher // During our testing, we encounter organizations of various different sizes, shapes, and composition. Β One that we’ve run across a number of times includes a fairly even mixture […]

The post How To: Empire’s Cross Platform Office Macro appeared first on Black Hills Information Security, Inc..

HostRecon: A Situational Awareness Tool

By: BHIS
4 April 2017 at 10:04

Beau Bullock // Overview HostRecon is a tool I wrote in PowerShell to assist with quickly enumerating a number of items that I would typically check after gaining access to […]

The post HostRecon: A Situational Awareness Tool appeared first on Black Hills Information Security, Inc..

Power Posing with PowerOPS

By: BHIS
25 January 2017 at 11:13

Brian FehrmanΒ // As described in my last blog post,Β Powershell Without Powershell – How To Bypass Application Whitelisting, Environment Restrictions & AVΒ (sheeesh…it’s been a bit!), we are seeing more environments in […]

The post Power Posing with PowerOPS appeared first on Black Hills Information Security, Inc..

PowerShell DNS Command & Control with dnscat2-powershell

By: BHIS
11 January 2017 at 13:04

Luke Baggett // Imagine a scenario where a Penetration Tester is trying to set up command and control on an internal network blocking all outbound traffic, except traffic towards a […]

The post PowerShell DNS Command & Control with dnscat2-powershell appeared first on Black Hills Information Security, Inc..

PowerShell Logging for the Blue Team

By: BHIS
12 December 2016 at 11:51

Joff Thyer // Β  It is no secret that PowerShell is increasingly being used as an offensive tool for attack purposes by both Red Teamers and Criminals alike. Thanks to […]

The post PowerShell Logging for the Blue Team appeared first on Black Hills Information Security, Inc..

❌
❌