❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Treating Antivirus as β€œThe Gold Standard”

By: BHIS
29 January 2018 at 10:27

Jordan Drysdale // Sacred Cash Cow Tipping Webcast 2018 follow-up The great Kaspersky Internet Security 2017 antivirus product lived up to and met all of my expectations in testing, so […]

The post Treating Antivirus as β€œThe Gold Standard” appeared first on Black Hills Information Security, Inc..

Bypassing Cylance: Part 5 – Looking Forward

By: BHIS
30 March 2017 at 18:49

John Strand// We just finished up a walk through of how we bypassed Cylance in a previous engagement. To conclude this exciting week, I want to share a few comments […]

The post Bypassing Cylance: Part 5 – Looking Forward appeared first on Black Hills Information Security, Inc..

Bypassing Cylance: Part 2 – Using DNSCat2

By: BHIS
28 March 2017 at 10:22

David Fletcher // The following techniques serve to illustrate methods for obtaining C2 communication in a particular Cylance protected environment.Β  The configuration of the centralized infrastructure and the endpoint agents […]

The post Bypassing Cylance: Part 2 – Using DNSCat2 appeared first on Black Hills Information Security, Inc..

Bypassing Cylance: Part 1 – Using VSAgent.exe

By: BHIS
27 March 2017 at 11:33

David Fletcher // Recently, we had the opportunity to test a production Cylance environment. Obviously, each environment is going to be different and the efficacy of security controls relies largely […]

The post Bypassing Cylance: Part 1 – Using VSAgent.exe appeared first on Black Hills Information Security, Inc..

How to Bypass Anti-Virus to Run Mimikatz

By: BHIS
5 January 2017 at 10:34

Carrie Roberts // * Would you like to run Mimikatz without Anti-Virus (AV) detecting it? Recently I attempted running the PowerShell script β€œInvoke-Mimikatz” from PowerSploitΒ on my machine but it was […]

The post How to Bypass Anti-Virus to Run Mimikatz appeared first on Black Hills Information Security, Inc..

Three Simple Disguises for Evading Antivirus

By: BHIS
7 July 2016 at 12:54

Logan Lembke // Antivirus has been a key component in defending computer systems since the 1990s. Over the years, antivirus began to dominate the discussion of PC security with other […]

The post Three Simple Disguises for Evading Antivirus appeared first on Black Hills Information Security, Inc..

How to Bypass Application Whitelisting & AV

By: BHIS
20 April 2016 at 11:41

Brian Fehrman // There are numerous methods that have been published to bypass Anti-Virus products. As a result, many companies are beginning to realize that application whitelisting is another tool […]

The post How to Bypass Application Whitelisting & AV appeared first on Black Hills Information Security, Inc..

❌
❌