❌

Normal view

Treating Antivirus as β€œThe Gold Standard”

By: BHIS
29 January 2018 at 16:27

Jordan Drysdale // Sacred Cash Cow Tipping Webcast 2018 follow-up The great Kaspersky Internet Security 2017 antivirus product lived up to and met all of my expectations in testing, so […]

The post Treating Antivirus as β€œThe Gold Standard” appeared first on Black Hills Information Security, Inc..

WEBCAST: Sacred Cash Cow Tipping 2018

By: BHIS
17 January 2018 at 00:48

John Strand// It’s time for our annual anti virus bypass extravaganza. See why AV can’t be the end all be all solution to your security framework in 2018! And if […]

The post WEBCAST: Sacred Cash Cow Tipping 2018 appeared first on Black Hills Information Security, Inc..

Bypassing Cylance: Part 5 – Looking Forward

By: BHIS
31 March 2017 at 00:49

John Strand// We just finished up a walk through of how we bypassed Cylance in a previous engagement. To conclude this exciting week, I want to share a few comments […]

The post Bypassing Cylance: Part 5 – Looking Forward appeared first on Black Hills Information Security, Inc..

Bypassing Cylance: Part 2 – Using DNSCat2

By: BHIS
28 March 2017 at 16:22

David Fletcher // The following techniques serve to illustrate methods for obtaining C2 communication in a particular Cylance protected environment.Β  The configuration of the centralized infrastructure and the endpoint agents […]

The post Bypassing Cylance: Part 2 – Using DNSCat2 appeared first on Black Hills Information Security, Inc..

Bypassing Cylance: Part 1 – Using VSAgent.exe

By: BHIS
27 March 2017 at 17:33

David Fletcher // Recently, we had the opportunity to test a production Cylance environment. Obviously, each environment is going to be different and the efficacy of security controls relies largely […]

The post Bypassing Cylance: Part 1 – Using VSAgent.exe appeared first on Black Hills Information Security, Inc..

Power Posing with PowerOPS

By: BHIS
25 January 2017 at 17:13

Brian FehrmanΒ // As described in my last blog post,Β Powershell Without Powershell – How To Bypass Application Whitelisting, Environment Restrictions & AVΒ (sheeesh…it’s been a bit!), we are seeing more environments in […]

The post Power Posing with PowerOPS appeared first on Black Hills Information Security, Inc..

How to Bypass Anti-Virus to Run Mimikatz

By: BHIS
5 January 2017 at 16:34

Carrie Roberts // * Would you like to run Mimikatz without Anti-Virus (AV) detecting it? Recently I attempted running the PowerShell script β€œInvoke-Mimikatz” from PowerSploitΒ on my machine but it was […]

The post How to Bypass Anti-Virus to Run Mimikatz appeared first on Black Hills Information Security, Inc..

Deploying a WebDAV Server

By: BHIS
9 November 2016 at 21:41

Carrie Roberts // There are various reasons why having a webDAV server comes in handy. The main reason I created one was to execute a malicious Outlook rule attack as […]

The post Deploying a WebDAV Server appeared first on Black Hills Information Security, Inc..

Three Simple Disguises for Evading Antivirus

Logan Lembke // Antivirus has been a key component in defending computer systems since the 1990s. Over the years, antivirus began to dominate the discussion of PC security with other […]

The post Three Simple Disguises for Evading Antivirus appeared first on Black Hills Information Security, Inc..

How to Bypass Application Whitelisting & AV

By: BHIS
20 April 2016 at 17:41

Brian Fehrman // There are numerous methods that have been published to bypass Anti-Virus products. As a result, many companies are beginning to realize that application whitelisting is another tool […]

The post How to Bypass Application Whitelisting & AV appeared first on Black Hills Information Security, Inc..

The New Security Fundamentals – Kill Your AV

By: BHIS
3 November 2015 at 22:35

John StrandΒ // AV is Dead Long Live Whitelisting. We have been discovering more and more of our tests bypass AV controls with ease.Β Β We have yet to see any iteration or […]

The post The New Security Fundamentals – Kill Your AV appeared first on Black Hills Information Security, Inc..

Modifying Metasploit x64 template for AV evasion

By: BHIS
21 October 2015 at 22:21

Joff Thyer // Β  When performing a penetration of test of organizations with Windows desktops, many testers will now resort to using tools like Veil’s Powershell Empire in order to […]

The post Modifying Metasploit x64 template for AV evasion appeared first on Black Hills Information Security, Inc..

❌