Finding the Right Penetration Testing Company
![]()
This blog is for anyone who is interested in finding a good penetration testing company.
The post Finding the Right Penetration Testing Company appeared first on Black Hills Information Security, Inc..
![]()
This blog is for anyone who is interested in finding a good penetration testing company.
The post Finding the Right Penetration Testing Company appeared first on Black Hills Information Security, Inc..
![]()
Setting goals is a deceptively simple career skill we all know is important, but how do you set goals youβre actually excited to work towards?
The post How to Set Smart Goals (That Actually Work For You) appeared first on Black Hills Information Security, Inc..
![]()
In Part 2, weβre diving headfirst into one of the most critical attack surfaces in the LLM ecosystem - Prompt Injection: The AI version of talking your way past the bouncer.
The post Getting Started with AI Hacking Part 2: Prompt Injection appeared first on Black Hills Information Security, Inc..
![]()
Whether it's forgotten temporary files, installation artifacts, READMEs, or even simple image files--default content on web servers can turn into a boon for attackers. In the most innocent of cases, these types of content can let attackers know more about the tech stack of the environment, and in the worst case scenario can lead to exploitation.
The post Default Web Content appeared first on Black Hills Information Security, Inc..

![]()
Organizations tend to focus a significant amount of their efforts on external threats, such as phishing and ransomware, but they often overlook one of the most dangerous attack vectors on their internal networks.Β
The post Commonly Abused Administrative Utilities: A Hidden Risk to Enterprise SecurityΒ appeared first on Black Hills Information Security, Inc..
![]()
DNS Triage is a reconnaissance tool that finds information about an organization's infrastructure, software, and third-party services as fast as possible. The goal of DNS Triage is not to exhaustively find every technology asset that exists on the internet. The goal is to find the most commonly abused items of interest for real attackers.
The post DNS Triage Cheatsheet appeared first on Black Hills Information Security, Inc..
![]()
GraphRunner is a collection of post-exploitation PowerShell modules for interacting with the Microsoft Graph API. It provides modules for enumeration, exfiltration, persistence, and more!
The post GraphRunner Cheatsheet appeared first on Black Hills Information Security, Inc..
![]()
Burp Suite is an intercepting HTTP proxy that can also scan a web-based service for vulnerabilities. A tool like this is indispensable for testing web applications. Burp Suite is written in Java and comes bundled with a JVM, so it works on any operating system you're likely to use.
The post Burp Suite Cheatsheet appeared first on Black Hills Information Security, Inc..
![]()
Nmap, also known as Network Mapper, is a commonly used network scanning tool. As penetration testers, Nmap is a tool we use daily that is indispensable for verifying configurations and identifying potential vulnerabilities.
The post Vulnerability Scanning with NmapΒ appeared first on Black Hills Information Security, Inc..
![]()
Dirsearch is an open-source multi-threaded βweb path discoveryβ tool first released in 2014. The program, written in Python, is similar to other tools such as Dirbuster or Gobuster, and aims to quickly find hidden content on web sites.
The post How to Use Dirsearch appeared first on Black Hills Information Security, Inc..
![]()
Compression is everywhereβin files, videos, storage, and networksβso itβs only natural it should also be in your workflow too. You can βcompressβ a series of tedious, repetitive tasks requiring multiple steps and several configurations into a single button press with a macro pad such as the Stream Deck or a fully software-customizable mechanical keyboard.Β
The post Why Use a Macro Pad? appeared first on Black Hills Information Security, Inc..
![]()
Espanso is a powerful cross-platform and open-source text replacement (or text expander) tool. At a simple level: it replaces what you type with something else.
The post Espanso: Text Replacement, the Easy Way appeared first on Black Hills Information Security, Inc..
![]()
For those of us in cybersecurity, there are a lot of unanswered questions and associated concerns about integrating AI into these various products. No small part of our worries has to do with the fact that this is new technology, and new tech always brings with it new security issues, especially technology that is evolving as quickly as AI.
The post Caging Copilot: Lessons Learned in LLM Security appeared first on Black Hills Information Security, Inc..
![]()
If youβve ever had to take a request from Burp and turn it into a command line, especially for jwt_tool.py, you know it can be painfulβbut no more! The βCopy Forβ extension is here to save valuable time.Β
The post Burp Suite Extension: Copy ForΒ appeared first on Black Hills Information Security, Inc..

![]()
This article was originally published in the SOC Issue of our PROMPT# zine, which you can read for free HERE. The information was adapted from the 2018 webcast βJohn Strandβs [β¦]
The post John Strandβs 5 Phase Plan For Starting in Computer Security appeared first on Black Hills Information Security, Inc..
![]()
It is no surprise that growing your social network can help get your name out there and provide opportunities to advance your career. LinkedIn, one of the original career-focused networking [β¦]
The post How to Put Yourself Out There β Networking on Social Media appeared first on Black Hills Information Security, Inc..
![]()
by Gerald Auger of Simply Cyber // Guest Author You want to break into cybersecurity? Thatβs AWESOME. Iβve been in the field for 20 years and I LOVE IT! But [β¦]
The post How to Get a Job in Cybersecurity appeared first on Black Hills Information Security, Inc..

![]()
| Bronwen Aker // Sr. Technical Editor, M.S. Cybersecurity, GSEC, GCIH, GCFE Go online these days and you will see tons of articles, posts, Tweets, TikToks, and videos about how [β¦]
The post Crafting the Perfect Prompt: Getting the Most Out of ChatGPT and Other LLMs appeared first on Black Hills Information Security, Inc..

![]()
This is the first installment in a series of blogs relating to practical analysis of wireless communications: what they are, how they work, and how they can be attacked. In [β¦]
The post Ghost in the Wireless: An introduction to Airspace Analysis with KismetΒ appeared first on Black Hills Information Security, Inc..
![]()
by Amanda Berlin of Mental Health Hackers This article was originally published in the second edition of the InfoSec Survival Guide. Find it free online HERE or order your $1 [β¦]
The post Mental Health β An Infosec Challenge appeared first on Black Hills Information Security, Inc..