❌

Reading view

Evasive File Smuggling with SkyhookΒ 

ImposterKeanu // IntroductionΒ  This blog post introduces the reader to β€œThe Obfuscation Hustle”, a term I enjoy using to describe the tedious process of obfuscating and delivering files to corporate […]

The post Evasive File Smuggling with SkyhookΒ  appeared first on Black Hills Information Security, Inc..

  •  

Collecting and Crafting User Information from LinkedIn

Justin Angel // Penetration testing and red team engagements often require operators to collect user information from various sources that can then be translated into inputs to support social engineering […]

The post Collecting and Crafting User Information from LinkedIn appeared first on Black Hills Information Security, Inc..

  •  

Analyzing ARP to Discover & Exploit Stale Network Address Configurations

Justin Angel// Introduction In penetration testing, ARP is most commonly discussed in terms of poisoning attacks where an attacker achieves a man-in-the-middle (MITM) position between victim nodes by contaminating the […]

The post Analyzing ARP to Discover & Exploit Stale Network Address Configurations appeared first on Black Hills Information Security, Inc..

  •  
❌