❌

Normal view

Model Context Protocol (MCP)

By: BHIS
22 October 2025 at 16:00

The Model Context Protocol (MCP) is a proposed open standard that provides a two-way connection for AI-LLM applications to interact directly with external data sources. It is developed by Anthropic and aims to simplify AI integrations by reducing the need for custom code for each new system.

The post Model Context Protocol (MCP) appeared first on Black Hills Information Security, Inc..

AI Large Language Models and Supervised Fine Tuning

By: BHIS
23 January 2025 at 16:00

This blog post is aimed at the intermediate level learner in the fields of data science and artificial intelligence. If you would like to read up on some fundamentals, here […]

The post AI Large Language Models and Supervised Fine Tuning appeared first on Black Hills Information Security, Inc..

Red Teaming: A Story From the Trenches

By: BHIS
18 April 2024 at 19:08

This article originally featured in the very first issue of our PROMPT# zine β€” Choose Wisely. You can find that issue (and all the others) here: https://www.blackhillsinfosec.com/prompt-zine/ I remember a […]

The post Red Teaming: A Story From the Trenches appeared first on Black Hills Information Security, Inc..

Initial Access Operations Part 2: Offensive DevOps

By: BHIS
29 February 2024 at 15:00

The Challenge As stated in PART 1 of this blog, the Windows endpoint defense technology stack in a mature organization represents a challenge for Red Teamer initial access operations. For […]

The post Initial Access Operations Part 2: Offensive DevOps appeared first on Black Hills Information Security, Inc..

Initial Access Operations Part 1: The Windows Endpoint Defense Technology Landscape

By: BHIS
22 February 2024 at 17:00

Today’s endpoint defense landscape on the Windows desktop platform is rich with product offerings of quite sophisticated capabilities. Beyond the world of antivirus products, Extended Detection and Response (XDR), and […]

The post Initial Access Operations Part 1: The Windows Endpoint Defense Technology Landscape appeared first on Black Hills Information Security, Inc..

The DNS over HTTPS (DoH) Mess

Joff Thyer // I woke up this Monday morning thinking that it’s about time I spent time looking at my Domain Name Service (DNS) configuration in my network. (This thought […]

The post The DNS over HTTPS (DoH) Mess appeared first on Black Hills Information Security, Inc..

Webcast: Shellcode Execution with GoLang

In this Black Hills Information Security (BHIS) webcast, we explore using GoLang to author malware with embedded shellcode. GoLang is a Google-authored modern successor language to C/C++. It is multi-platform, […]

The post Webcast: Shellcode Execution with GoLang appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

Securely Deploying IPv6 in 2020 Part 1: Internet Facing Perimeter

Joff Thyer // Introduction If there is anything that the start of 2020 has taught us, it is that Internetworking services are in higher demand than ever before.Β  IPv4 is […]

The post Securely Deploying IPv6 in 2020 Part 1: Internet Facing Perimeter appeared first on Black Hills Information Security, Inc..

Tap Into Your Valuable DNS Data

Joff Thyer // The Domain Name System (DNS) is the single most important protocol on the Internet. The distributed architecture of DNS name servers and resolvers has resulted in a […]

The post Tap Into Your Valuable DNS Data appeared first on Black Hills Information Security, Inc..

Pentesting Dropbox on Steroids

By: BHIS
20 November 2018 at 16:34

Joff Thyer// Many of you have probably already looked at Beau Bullock’s fine blog entry on a penetration testing dropbox. Beau has some excellent guidance on how to build the […]

The post Pentesting Dropbox on Steroids appeared first on Black Hills Information Security, Inc..

Embedding Meterpreter in Android APK

By: BHIS
15 October 2018 at 17:52

Joff Thyer// Mobile is everywhere these days. So many applications in our daily life are being migrated towards a cloud deployment whereby the front end technology is back to the […]

The post Embedding Meterpreter in Android APK appeared first on Black Hills Information Security, Inc..

Got Privs? Crack Those Hashes!

Joff Thyer // Black Hills Information Security loves performing both internal penetration tests, as well as command and control testing for our customers. Thanks to the efforts of many great […]

The post Got Privs? Crack Those Hashes! appeared first on Black Hills Information Security, Inc..

Are You Really Hacking Naked?

By: BHIS
12 October 2017 at 17:01

Joff Thyer // I had an interesting experience recently that reminded me to always β€œtrust but verify.” Let me set the stage for you. As a penetration tester, and IT […]

The post Are You Really Hacking Naked? appeared first on Black Hills Information Security, Inc..

❌