❌

Reading view

Burp Suite Cheatsheet

Burp Suite is an intercepting HTTP proxy that can also scan a web-based service for vulnerabilities. A tool like this is indispensable for testing web applications. Burp Suite is written in Java and comes bundled with a JVM, so it works on any operating system you're likely to use.

The post Burp Suite Cheatsheet appeared first on Black Hills Information Security, Inc..

  •  

Testing TLS and CertificatesΒ 

Pentest reports sometimes include bad information under a heading like, β€œWeak TLS Configuration” or β€œInsecure SSL Certificates.” This article will explain how TLS is supposed to work, common ways it […]

The post Testing TLS and CertificatesΒ  appeared first on Black Hills Information Security, Inc..

  •  

Webcast: Hack for Show, Report For Dough: Part 2

At Black Hills Information Security (BHIS), we make our living doing pentesting, but we’ve never once been paid for a pentest. Penetration Testers get paid for their reports. For their […]

The post Webcast: Hack for Show, Report For Dough: Part 2 appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

  •  

Webcast: Uncovering Secrets and Simplifying Your Life with CyberChef

Information takes many forms. Some of these forms are easy to understand and others less so. Some are hardly even recognizable. How do you know when you’ve found something interesting? […]

The post Webcast: Uncovering Secrets and Simplifying Your Life with CyberChef appeared first on Black Hills Information Security, Inc..

  •  

Webcast: Getting Started with Burp Suite & Webapp Pentesting

Are you responsible for the security of webapps? Are you curious about how penetration testers are able to find vulnerabilities in them? Burp Suite is the preferred tool for many […]

The post Webcast: Getting Started with Burp Suite & Webapp Pentesting appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

  •  

Webcast: Modern Webapp Pentesting: How to Attack a JWT

So much information about testing webapps for security problems is old. Don’t get me wrong, the old stuff still works way more often than we’d like, but there’s more to […]

The post Webcast: Modern Webapp Pentesting: How to Attack a JWT appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

  •  

Webcast: Free Tools! How to Use Developer Tools and Javascript in Webapp Pentests

I like webapps, don’t you? Webapps have got to be the best way to learn about security. Why? Because they’re self-contained and so very transparent. You don’t need a big […]

The post Webcast: Free Tools! How to Use Developer Tools and Javascript in Webapp Pentests appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

  •  

Your Reporting Matters: How to Improve Pen Test Reporting

Brian B. KingΒ // This is a companion post to BBKing’s β€œHack for Show, Report for Dough” report, given at BSides Cleveland in June 2019. The fun part of pentesting is […]

The post Your Reporting Matters: How to Improve Pen Test Reporting appeared first on Black Hills Information Security, Inc..

  •  

How to Find an InfoSec Mentor

BB King // We got an email from a fan today asking how best to find a mentor in information security. Maybe you’re looking for a mentor too. It’s a […]

The post How to Find an InfoSec Mentor appeared first on Black Hills Information Security, Inc..

  •  

WEBCAST: Web App Assessments for Non-Majors

BB King // BB King looks at testing modern web apps in that β€œenterprise environment” so many of us inhabit. Taking the perspective of the Lonely Application Security Person in […]

The post WEBCAST: Web App Assessments for Non-Majors appeared first on Black Hills Information Security, Inc..

  •  

When Infosec and Weed Collide: Handling Administrative Actions Safely

BB King//* The state of Ohio recently validated a webapp pentest finding that sometimes goes overlooked. It relates to the details of administrative functions, how they can be abused, and […]

The post When Infosec and Weed Collide: Handling Administrative Actions Safely appeared first on Black Hills Information Security, Inc..

  •  

Towards a Quieter Firefox

Brian King // On a recent webapp test, I got a little frustrated with all the extra HTTP requests showing up in my Burpsuite Proxy History from connections that Firefox […]

The post Towards a Quieter Firefox appeared first on Black Hills Information Security, Inc..

  •  

GNU Screen Quick Reference

Brian King // I use GNU ScreenΒ mainly to prevent processes from dying when I disconnect from an SSH session, but GNU Screen can do a whole lot more than that […]

The post GNU Screen Quick Reference appeared first on Black Hills Information Security, Inc..

  •  

Certificate Transparency Means What, Again?

Brian King // News from Google this week says that Chrome will start enforcing Certificate Transparency a year from now. https://groups.google.com/a/chromium.org/forum/#!topic/ct-policy/78N3SMcqUGw This means that when Chrome contacts a website, if […]

The post Certificate Transparency Means What, Again? appeared first on Black Hills Information Security, Inc..

  •  
  •  

Browser Plugin Oversharing

Brian King // Β  Do you know what that browser plugin is doing? There’s a browser plugin for just about everything. You can find one to change the name of […]

The post Browser Plugin Oversharing appeared first on Black Hills Information Security, Inc..

  •  

Three Minutes with the HTTP TRACE Method

Brian King // All of our scanning tools tell us that we should disable the HTTP TRACE and TRACK methods. And we all think that’s because there’s something an attacker […]

The post Three Minutes with the HTTP TRACE Method appeared first on Black Hills Information Security, Inc..

  •  
❌