❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

How to Use Dirsearch

By: BHIS
2 July 2025 at 10:00

Dirsearch is an open-source multi-threaded β€œweb path discovery” tool first released in 2014. The program, written in Python, is similar to other tools such as Dirbuster or Gobuster, and aims to quickly find hidden content on web sites.

The post How to Use Dirsearch appeared first on Black Hills Information Security, Inc..

Reconnaissance: Azure Cloud w/ Kevin Klingbile

By: BHIS
7 October 2024 at 11:16

This webcast was originally published on September 26, 2024. In this video, Kevin Klingbile from Black Hills Information Security discusses the intricacies of Azure Cloud services and M365, focusing on […]

The post Reconnaissance: Azure Cloud w/ Kevin Klingbile appeared first on Black Hills Information Security, Inc..

Introducing SlackEnum: A User Enumeration Tool for Slack

By: BHIS
27 June 2024 at 11:00

Recently, as part of our ANTISOC Continuous Penetration Testing (CPT) service, I had an opportunity to investigate how attackers can leverage Slack in cyber-attacks, similar to how we frequently use […]

The post Introducing SlackEnum: A User Enumeration Tool for Slack appeared first on Black Hills Information Security, Inc..

Shenetworks Recommends: Using Nmap Like a ProΒ 

By: BHIS
5 June 2023 at 15:23

shenetworks // One day at work I received a case stating a client couldn’t connect to the management interface of a new server. I asked the client to change the […]

The post Shenetworks Recommends: Using Nmap Like a ProΒ  appeared first on Black Hills Information Security, Inc..

Gowitness, a Tester’s Time Saver

16 February 2023 at 13:30

Alyssa Snow // During an external or internal network penetration test, it can be challenging to comb through each web server in scope to find the juicy stuff. During a […]

The post Gowitness, a Tester’s Time Saver appeared first on Black Hills Information Security, Inc..

SNMP… Strings Attached!

21 December 2022 at 10:08

Dale Hobbs // One thing that I almost always find when performing an internal network penetration test is Simple Network Management Protocol (SNMP) configured with default community strings. Simple Network […]

The post SNMP… Strings Attached! appeared first on Black Hills Information Security, Inc..

New PowerShell History Defense Evasion Technique

29 November 2022 at 11:15

Carrie Roberts // PowerShell incorporates the handy feature of writing commands executed to a file to make them easy to refer back to later. This functionality is provided by the […]

The post New PowerShell History Defense Evasion Technique appeared first on Black Hills Information Security, Inc..

What’s Changed in Recon-ng 5.x

By: BHIS
26 November 2019 at 11:22

Brian King // Recon-ng had a major update in June 2019, from 4.9.6 to 5.0.0. This post is meant to help with the adjustment by providing a cheat sheet for […]

The post What’s Changed in Recon-ng 5.x appeared first on Black Hills Information Security, Inc..

Tap Into Your Valuable DNS Data

By: BHIS
3 June 2019 at 11:21

Joff Thyer // The Domain Name System (DNS) is the single most important protocol on the Internet. The distributed architecture of DNS name servers and resolvers has resulted in a […]

The post Tap Into Your Valuable DNS Data appeared first on Black Hills Information Security, Inc..

I Spy with InSpy v3.0

By: BHIS
28 January 2019 at 11:34

Darin Roberts// Early in 2018 I wrote a blog about InSpy. InSpy is a great reconnaissance tool that gathers usernames from LinkedIn. My first blog can be found here. A […]

The post I Spy with InSpy v3.0 appeared first on Black Hills Information Security, Inc..

I Spy with InSpy

By: BHIS
5 February 2018 at 10:33

Darin Roberts// Do you ever find yourself on an engagement and need just a few more names with which to conduct a password spray?Β Everyone knows the more emails you have, […]

The post I Spy with InSpy appeared first on Black Hills Information Security, Inc..

❌
❌