❌

Reading view

Augmenting Security Testing and Analysis Activities with Microsoft 365 Products

Use of Microsoft 365 products in security testing is not a new concept. For a long time, I’ve incorporated various activities using Office products into my testing regimen. In the […]

The post Augmenting Security Testing and Analysis Activities with Microsoft 365 Products appeared first on Black Hills Information Security, Inc..

  •  

Your Reporting Matters: How to Improve Pen Test Reporting

Brian B. KingΒ // This is a companion post to BBKing’s β€œHack for Show, Report for Dough” report, given at BSides Cleveland in June 2019. The fun part of pentesting is […]

The post Your Reporting Matters: How to Improve Pen Test Reporting appeared first on Black Hills Information Security, Inc..

  •  

How to Get Malicious Macros Past Email Filters

Carrie Roberts // Β  Β  Β  A malicious macro in a Microsoft Word or Excel document is an effective hacking technique. These documents could be delivered in a variety of […]

The post How to Get Malicious Macros Past Email Filters appeared first on Black Hills Information Security, Inc..

  •  

Click to Enable Content

Sally Vandeven // Evading anti-virus scanners has become a bit of a sport around BHIS. Β When we do C2 testing for our customers we start with a host on the […]

The post Click to Enable Content appeared first on Black Hills Information Security, Inc..

  •  

Warning: This Post Contains Macros

Lisa Woody // On the 23rd of December, a cyber attack left hundreds of thousands of people in the Ukrainian region of Ivano-Frankivsk without power. This was the first confirmed […]

The post Warning: This Post Contains Macros appeared first on Black Hills Information Security, Inc..

  •  

Using Simple Burp Macros to Automate Testing

David Fletcher // Recently, while assessing a web application I noticed content on one of the pages that appeared to be derived from sensitive information stored within the site’s user […]

The post Using Simple Burp Macros to Automate Testing appeared first on Black Hills Information Security, Inc..

  •  
❌