❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

How to Test Adversary-in-the-Middle Without Hacking Tools

By: BHIS
24 March 2025 at 11:00

In this video, Michael Allen discusses how to test Adversary-in-the-Middle attacks without using hacking tools. He delves into the intricacies of credential harvesting, the evolution of multi-factor authentication (MFA), and how attackers adapt their strategies to bypass security measures.

The post How to Test Adversary-in-the-Middle Without Hacking Tools appeared first on Black Hills Information Security, Inc..

How to Hack Wi-Fi with No Wi-Fi

By: BHIS
17 March 2025 at 11:00

In this video, John Strand and his team discuss the challenges of setting up and running wireless labs, particularly focusing on the issues faced during Wild West Hackin’ Fest events. They highlight the development of an open-source project aimed at virtualizing wireless labs, which allows learners to practice wireless hacking techniques without needing physical hardware.

The post How to Hack Wi-Fi with No Wi-Fi appeared first on Black Hills Information Security, Inc..

Why Your Org Needs a Penetration Test Program

By: BHIS
10 March 2025 at 11:30

This webcast originally aired on February 27, 2025. Join us for a very special free one-hour Black Hills Information Security webcast with Corey Ham & Kelli Tarala on why your […]

The post Why Your Org Needs a Penetration Test Program appeared first on Black Hills Information Security, Inc..

Light at the End of the Dark Web

By: BHIS
3 March 2025 at 11:00

Join us for this one-hour Black Hills Information Security webcast with Joseph - Security Analyst, as he shares with you what he's discovered and learned about the Dark Web, so you never ever ever have to go there for yourself.

The post Light at the End of the Dark Web appeared first on Black Hills Information Security, Inc..

Introduction to Zeek Log Analysis

By: BHIS
13 January 2025 at 11:00

In this video, Troy Wojewoda discusses the intricacies of Zeek log analysis, focusing on how this network security monitoring system can be used to understand traffic and analyze logs effectively.

The post Introduction to Zeek Log Analysis appeared first on Black Hills Information Security, Inc..

Creating Burp Extensions: A Beginner’s Guide

By: BHIS
6 January 2025 at 13:10

In this video, Dave Blandford discusses a beginner's guide to creating Burp Suite extensions. The session covers an overview of what Burp extensions are, how they can improve testing capabilities, and the tools and languages used in developing them.

The post Creating Burp Extensions: A Beginner’s Guide appeared first on Black Hills Information Security, Inc..

DLL Hijacking – A New Spin on Proxying your Shellcode

By: BHIS
14 October 2024 at 11:20

This webcast was originally published on October 4, 2024. In this video, experts delve into the intricacies of DLL hijacking and new techniques for malicious code proxying, featuring a comprehensive […]

The post DLL Hijacking – A New Spin on Proxying your Shellcode appeared first on Black Hills Information Security, Inc..

Reconnaissance: Azure Cloud w/ Kevin Klingbile

By: BHIS
7 October 2024 at 11:16

This webcast was originally published on September 26, 2024. In this video, Kevin Klingbile from Black Hills Information Security discusses the intricacies of Azure Cloud services and M365, focusing on […]

The post Reconnaissance: Azure Cloud w/ Kevin Klingbile appeared first on Black Hills Information Security, Inc..

❌
❌