❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayBlack Hills

Exploit Development – A Sincere Form of Flattery

By: BHIS
9 February 2023 at 13:31

moth // Recently, BHIS penetration tester Dale Hobbs was on an Internal Network Penetration Test and came across an RPC-based arbitrary command execution vulnerability in his vulnerability scan results.Β  I […]

The post Exploit Development – A Sincere Form of Flattery appeared first on Black Hills Information Security.

Who’s Bootin’? Dissecting the Master Boot Record

By: BHIS
7 February 2023 at 11:36

Hal Denton // Have you ever been given an encrypted hard drive to perform forensic analysis on? What could go wrong? Probably the first thought rolling through your mind is […]

The post Who’s Bootin’? Dissecting the Master Boot Record appeared first on Black Hills Information Security.

How to Build a Pentest Robot With Selenium IDE

By: BHIS
2 February 2023 at 11:51

Have you ever been on a pentest and thought to yourself, β€œI wish I had a robot to do this testing for me right now cuz this is just too much work”?

The post How to Build a Pentest Robot With Selenium IDE appeared first on Black Hills Information Security.

PNPT: Certification Review

By: BHIS
31 January 2023 at 07:52

Daniel Pizarro // What is the PNPT?Β  The Practical Network Penetration Tester (PNPT), created by TCM Security (TCMS), is a 5-day ethical hacking certification exam that assesses a pentester’s ability […]

The post PNPT: Certification Review appeared first on Black Hills Information Security.

Start to Finish: Configuring an Android Phone for Pentesting

By: BHIS
25 January 2023 at 10:26

Jeff Barbi // *Guest Post Background Unless you’re pentesting mobile apps consistently, it’s easy for your methodologies to fall out of date. Each new version of Android brings with it […]

The post Start to Finish: Configuring an Android Phone for Pentesting appeared first on Black Hills Information Security.

Forward into 2023: Browser and O/S Security FeaturesΒ 

By: BHIS
18 January 2023 at 11:38

Joff Thyer // Introduction We have already arrived at the end of 2022; wow, that was fast. As with any industry or aspect of life, we find ourselves peering into […]

The post <strong>Forward into 2023: Browser and O/S Security Features</strong>Β  appeared first on Black Hills Information Security.

Talkin’ About Infosec News – 12/21/2022

00:00 – PreShow Banterβ„’ β€” Talkin’ Bout [Elon] News00:51 – BHIS – Talkin’ Bout [infosec] News 2022-12-1902:46 – Story # 1: Antivirus and EDR solutions tricked into acting as data […]

The post Talkin’ About Infosec News – 12/21/2022 appeared first on Black Hills Information Security.

πŸ’Ύ

SNMP… Strings Attached!

By: BHIS
21 December 2022 at 10:08

Dale Hobbs // One thing that I almost always find when performing an internal network penetration test is Simple Network Management Protocol (SNMP) configured with default community strings. Simple Network […]

The post SNMP… Strings Attached! appeared first on Black Hills Information Security.

PlumHound Reporting Engine for BloodHoundAD

By: BHIS
6 December 2022 at 12:05

Kent Ickler // It’s been over two years since Jordan and I talked about a Blue Team’s perspective on Red Team tools.Β Β  A Blue Team’s Perspective on Red Team Hack […]

The post PlumHound Reporting Engine for BloodHoundAD appeared first on Black Hills Information Security.

New PowerShell History Defense Evasion Technique

By: BHIS
29 November 2022 at 11:15

Carrie Roberts // PowerShell incorporates the handy feature of writing commands executed to a file to make them easy to refer back to later. This functionality is provided by the […]

The post New PowerShell History Defense Evasion Technique appeared first on Black Hills Information Security.

Webcast: Firmware Enumeration Using Open Source Tools w/ Paul Asadoorian

By: BHIS
4 November 2022 at 10:28

In this Black Hills Information Security (BHIS) webcast, Paul will share free and open-source tools and techniques to evaluate the state of security on the firmware-based devices that live inside […]

The post Webcast: Firmware Enumeration Using Open Source Tools w/ Paul Asadoorian appeared first on Black Hills Information Security.

Webcast: Pentester Tactics, Techniques, and Procedures TTPs w/ Chris Traynor

By: BHIS
4 November 2022 at 10:24

Penetration Testing is often considered a dark art that’s shrouded in mystery. This unfortunate perception can hold back organizations from being more secure and keep people from an exciting career. […]

The post Webcast: Pentester Tactics, Techniques, and Procedures TTPs w/ Chris Traynor appeared first on Black Hills Information Security.

❌
❌