❌

Reading view

Webcast: Kerberos & Attacks 101

Join the BHIS Discord discussion server: https://discord.gg/aHHh3u5 We’re really excited to have a close member of our BHIS extended family, Tim Medin from Red Siege InfoSec, here for a webcast […]

The post Webcast: Kerberos & Attacks 101 appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

  •  

BHIS Webcast: Tracking Attackers. Why Attribution Matters and How To Do It.

In this BHISΒ webcast,Β we cover some new techniques and tactics on how to track attackers via various honey tokens.Β  We cover how to track with Word Web Bugs in ADHD and […]

The post BHIS Webcast: Tracking Attackers. Why Attribution Matters and How To Do It. appeared first on Black Hills Information Security, Inc..

  •  

WEBCAST: RDP Logging Bypass and Azure Active Directory Recon

For this webcast we cover a couple of different topics. First, we talk about how to password spray in a non-attributable sort of way. Beau found a way to obfuscate […]

The post WEBCAST: RDP Logging Bypass and Azure Active Directory Recon appeared first on Black Hills Information Security, Inc..

  •  

WEBCAST: BHIS Sorta Top Used Tools of 2018

John Strand// In this webcast we cover some of the core tools we use all the time at Black Hills Information Security. However, there’s a twist. We don’t talk about […]

The post WEBCAST: BHIS Sorta Top Used Tools of 2018 appeared first on Black Hills Information Security, Inc..

  •  

WEBCAST: Raising Hacker Kids

John Strand & Jordan Drysdale// Yes.. Ethical Hacker Kids. The holidays are coming up! Here John & Jordan cover the different games, tools and gifts we can give kids that […]

The post WEBCAST: Raising Hacker Kids appeared first on Black Hills Information Security, Inc..

  •  

WEBCAST: Blue Team-Apalooza

Kent Ickler & Jordan Drysdale // Preface We had a sysadmin and security professional β€œAA” meeting on November 8, 2018. We met and discussed things that seem to be painfully […]

The post WEBCAST: Blue Team-Apalooza appeared first on Black Hills Information Security, Inc..

  •  

WEBCAST: Creating and Keeping a Malware Zoo

John Strand// Join John as he covers what he and the BHIS Systems team have been working on lately – creating a C2/Implant/Malware test bed. Testing our C2/malware solutions is […]

The post WEBCAST: Creating and Keeping a Malware Zoo appeared first on Black Hills Information Security, Inc..

  •  
  •  

WEBCAST: Highly Caffeinated InfoSec

Beau Bullock & Mike Felch// Ways to Learn More, Network, and Wake Up Your Inner Hacker Whether you are brand new to InfoSec or a skilled veteran there are ways […]

The post WEBCAST: Highly Caffeinated InfoSec appeared first on Black Hills Information Security, Inc..

  •  

WEBCAST: Hacker Tools, Compliments of Microsoft

David Fletcher & Sally Vandeven// Join David β€œFletch” and Sally as they explore the cornucopia of wonderful, free tools in the SysInternals Suite that conveniently are signed by Microsoft and […]

The post WEBCAST: Hacker Tools, Compliments of Microsoft appeared first on Black Hills Information Security, Inc..

  •  

WEBCAST: Testing G Suites with MailSniper

Matthew Toussain// Join Matt Toussain as he talks about Mailsniper, a tool written by our very own Beau Bullock. Wouldn’t you like to START your pen tests knowing every username […]

The post WEBCAST: Testing G Suites with MailSniper appeared first on Black Hills Information Security, Inc..

  •  

PODCAST: Attack Tactics Part 2

John talked about how we’d attack, here’s how you can defend against those attacks. Grab the slides here:Β https://blackhillsinformationsecurity.shootproof.com/gallery/6843799/

The post PODCAST: Attack Tactics Part 2 appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

  •  

WEBCAST: Web App Assessments for Non-Majors

BB King // BB King looks at testing modern web apps in that β€œenterprise environment” so many of us inhabit. Taking the perspective of the Lonely Application Security Person in […]

The post WEBCAST: Web App Assessments for Non-Majors appeared first on Black Hills Information Security, Inc..

  •  

WEBCAST: GDPR – Spring Storm Warning

CJ Cox// Spring storms are often more dangerous and unpredictable than winter storms. The GDPR looks to be no exception. The General Data Protection Regulation is a universal law brought […]

The post WEBCAST: GDPR – Spring Storm Warning appeared first on Black Hills Information Security, Inc..

  •  

WEBCAST: How to Use Threat Intelligence

John Strand// Using threat intelligence feeds for good….instead of wasting time and money. John’s intense hatred for threat intelligence feeds is pretty well known. Trying to defend your network against […]

The post WEBCAST: How to Use Threat Intelligence appeared first on Black Hills Information Security, Inc..

  •  
❌