Are you over 18 and want to see adult content?
More Annotations
A complete backup of www.malevsfemale.org
Are you over 18 and want to see adult content?
A complete backup of www.www.amateur.tv
Are you over 18 and want to see adult content?
A complete backup of worldwidewives.com
Are you over 18 and want to see adult content?
A complete backup of www.neatmovies.com
Are you over 18 and want to see adult content?
A complete backup of www.kaufmich.com
Are you over 18 and want to see adult content?
Favourite Annotations
A complete backup of schuylerlake.com
Are you over 18 and want to see adult content?
A complete backup of backpackerverse.com
Are you over 18 and want to see adult content?
A complete backup of sintisidoruskapel.nl
Are you over 18 and want to see adult content?
A complete backup of facilysencillo.es
Are you over 18 and want to see adult content?
A complete backup of marketingsource.com
Are you over 18 and want to see adult content?
A complete backup of pawhuskajournalcapital.com
Are you over 18 and want to see adult content?
Text
idea
BACKDOORS & BREACHES Edward Miro // Backdoors & Breaches is now available as an official Workshop Mod for Tabletop Simulator! Backdoors & Breaches (B&B) contains 52+ unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. This post is a guide for getting a virtual B&B game going. Note: Newattack,
HOW TO REPLAY RF SIGNALS USING SDR Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your traffic. Preface: Recently, DETECTING MALWARE BEACONS WITH ZEEK AND RITA The first one I’m going to talk about is beacons. We’ll talk a little bit about what it means to be a beacon for these things. Here, you can see that we have a source IP address of 10.234.234.100 and a destination IP address of 138.197.117.74. You can also see that there was 4,532 connections. GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably HOW TO FIX A MISSING CONTENT-SECURITY-POLICY ON A WEBSITE Kent Ickler // Content-Security-Policy-What-What? Content-Security-Policy is a security header that can (and should) be included on communication from your website’s server to a client. When a user goes to your website, headers are used for the client and server to exchange information about the browsing session. This is typically all done in the background unbeknownst HOW TO DISABLE LLMNR & WHY YOU WANT TO Kent R. Ickler // Link-Local Multicast Name Resolution (LLMNR) This one is a biggie, and you’ve probably heard Jordan, John, me, and all the others say it many many times. LLMNR was (is) a protocol used that allowed name resolution without the requirement of a DNS server. It was (is) able to provide a hostname-to-IP HOW TO BYPASS ANTI-VIRUS TO RUN MIMIKATZ Uploading the Invoke-Mimikatz.ps1 file to VirusTotal showed that 19 of 54 AV vendors currently detect this file as malicious. AV Detection Rate for Unmodified Mimikatz Script. While uploading to VirusTotal is not a conclusive way to determine if a malicious file will be detected, it can hint to what AV may be triggering on. HOME PAGE - BLACK HILLS INFORMATION SECURITYABOUT USCONTACTSERVICESBLOGRED TEAMINGHTOC Black Hills Information Security. “ Our main goal is not to prove that we can hack into a company but to help the customer develop a series of on-point solutions and technologies that will improve the overall security of the company. Testing should never be adversarial, but collaborative .”. – USING SDR TO BUILD A TRUNK TRACKER Ray Felch // Introduction Recently, I came across an interesting article on using software-defined radio (SDR) to create a Police, Fire, EMS, and Public Safety systems scanner. Viewing a few of these Trunk tracking scanners on Amazon, I quickly discovered that they are not cheap at all. You can spend several hundred dollars on a Trunked Radio tracking scanner; however, we WEBCAST: OK, LET'S TALK ABOUT RANSOMWARE Watch on. 0:00. 0:00. 0:00 / 1:40:07. Live. •. This is a joint emergency webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand. There have been a couple of very scary ransomware stories in the news over the past few weeks. We figured it would be a goodidea
BACKDOORS & BREACHES Edward Miro // Backdoors & Breaches is now available as an official Workshop Mod for Tabletop Simulator! Backdoors & Breaches (B&B) contains 52+ unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. This post is a guide for getting a virtual B&B game going. Note: Newattack,
HOW TO REPLAY RF SIGNALS USING SDR Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your traffic. Preface: Recently, DETECTING MALWARE BEACONS WITH ZEEK AND RITA The first one I’m going to talk about is beacons. We’ll talk a little bit about what it means to be a beacon for these things. Here, you can see that we have a source IP address of 10.234.234.100 and a destination IP address of 138.197.117.74. You can also see that there was 4,532 connections. GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably HOW TO FIX A MISSING CONTENT-SECURITY-POLICY ON A WEBSITE Kent Ickler // Content-Security-Policy-What-What? Content-Security-Policy is a security header that can (and should) be included on communication from your website’s server to a client. When a user goes to your website, headers are used for the client and server to exchange information about the browsing session. This is typically all done in the background unbeknownst HOW TO DISABLE LLMNR & WHY YOU WANT TO Kent R. Ickler // Link-Local Multicast Name Resolution (LLMNR) This one is a biggie, and you’ve probably heard Jordan, John, me, and all the others say it many many times. LLMNR was (is) a protocol used that allowed name resolution without the requirement of a DNS server. It was (is) able to provide a hostname-to-IP HOW TO BYPASS ANTI-VIRUS TO RUN MIMIKATZ Uploading the Invoke-Mimikatz.ps1 file to VirusTotal showed that 19 of 54 AV vendors currently detect this file as malicious. AV Detection Rate for Unmodified Mimikatz Script. While uploading to VirusTotal is not a conclusive way to determine if a malicious file will be detected, it can hint to what AV may be triggering on. DARKNET - BLACK HILLS INFORMATION SECURITY Welcome Darknet Diaries Listeners! All of us at Black Hills Information Security thank you for checking out our most popular and upcoming free information security how-to videos, webcasts, and affordable training courses. If you haven’t listened to it yet, check out John Strand’s (Owner & Founder) Darknet Diaries Episode– 67: THE BIG
RITA - BLACK HILLS INFORMATION SECURITY RITA Real Intelligence Threat Analytics This project, born from BHIS, is now developed, funded and supported by Active Countermeasures Download RITA here RITA on Security Weekly with John Strand John does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to get TRACKING ATTACKERS WITH WORD WEB BUGS (CYBER DECEPTION So, let’s actually go through how a Word Web Bug document works. Now in this particular video, we’re using the Active Defense Harbinger Distribution.This is the distribution I use for my class on cyber deception at Wild West Hackin’ Fest, both in San Diego and in Deadwood, South Dakota, and I also use it for whenever I teach that class at BlackHat, the four-day version of that class. GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably HOW TO FIX A MISSING CONTENT-SECURITY-POLICY ON A WEBSITE Kent Ickler // Content-Security-Policy-What-What? Content-Security-Policy is a security header that can (and should) be included on communication from your website’s server to a client. When a user goes to your website, headers are used for the client and server to exchange information about the browsing session. This is typically all done in the background unbeknownst INTRO TO SOFTWARE DEFINED RADIO AND GSM/LTE Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your phone traffic. Preface: I held an Advanced Amateur Radio Operator INFORMATION FROM THIN AIR: USING SDR TO EXTRACT DTMF FROM This device can be tuned from 1 MHz to 6 GHz, is a half-duplex transceiver, achieves up to 20 million samples per second, using 8-bit quadrature samples (8-bit I and 8-bit Q), and is compatible with open-source GNU Radio, SDR#, and more. Also, the HackRF is A SYSMON EVENT ID BREAKDOWN Jordan Drysdale // tl;dr This blog is being provided to demonstrate the capabilities of Sysmon logging broken down by event ID. The IDs will be captured in context and matched to their sysmon-modular configuration section for tuning opportunities. Please allow me a shout out here to the author of the sysmon-modular repository onGithub. Olaf
HOW TO BYPASS ANTI-VIRUS TO RUN MIMIKATZ Would you like to run Mimikatz without Anti-Virus (AV) detecting it? Recently I attempted running the PowerShell script “Invoke-Mimikatz” from PowerSploit on my machine but it was flagged by Windows Defender as malicious when saving the file to disk. Even when I ran this file without writing it to disk using the following command it still got caught. HOW TO: C2 OVER ICMP In order to get my ICMP C2 to work, I had to disable machine-based ICMP. I was able to do this by using the following command. HOME PAGE - BLACK HILLS INFORMATION SECURITYABOUT USCONTACTSERVICESBLOGRED TEAMINGHTOC Black Hills Information Security. “ Our main goal is not to prove that we can hack into a company but to help the customer develop a series of on-point solutions and technologies that will improve the overall security of the company. Testing should never be adversarial, but collaborative .”. – DARKNET - BLACK HILLS INFORMATION SECURITY Welcome Darknet Diaries Listeners! All of us at Black Hills Information Security thank you for checking out our most popular and upcoming free information security how-to videos, webcasts, and affordable training courses. If you haven’t listened to it yet, check out John Strand’s (Owner & Founder) Darknet Diaries Episode– 67: THE BIG
USING SDR TO BUILD A TRUNK TRACKER Ray Felch // Introduction Recently, I came across an interesting article on using software-defined radio (SDR) to create a Police, Fire, EMS, and Public Safety systems scanner. Viewing a few of these Trunk tracking scanners on Amazon, I quickly discovered that they are not cheap at all. You can spend several hundred dollars on a Trunked Radio tracking scanner; however, we BACKDOORS & BREACHES Edward Miro // Backdoors & Breaches is now available as an official Workshop Mod for Tabletop Simulator! Backdoors & Breaches (B&B) contains 52+ unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. This post is a guide for getting a virtual B&B game going. Note: Newattack,
BACKDOORS & BREACHES Welcome to Backdoors & Breaches, an Incident Response Card Game, from Black Hills Information Security and Active Countermeasures. Backdoors & Breaches contains 52 unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. We’re excited for you to play and learn from the game!Below you will find
GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably HOW TO REPLAY RF SIGNALS USING SDR Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your traffic. Preface: Recently, TRACKING ATTACKERS WITH WORD WEB BUGS (CYBER DECEPTION So, let’s actually go through how a Word Web Bug document works. Now in this particular video, we’re using the Active Defense Harbinger Distribution.This is the distribution I use for my class on cyber deception at Wild West Hackin’ Fest, both in San Diego and in Deadwood, South Dakota, and I also use it for whenever I teach that class at BlackHat, the four-day version of that class. DETECTING MALWARE BEACONS WITH ZEEK AND RITA The first one I’m going to talk about is beacons. We’ll talk a little bit about what it means to be a beacon for these things. Here, you can see that we have a source IP address of 10.234.234.100 and a destination IP address of 138.197.117.74. You can also see that there was 4,532 connections. HOW TO DISABLE LLMNR & WHY YOU WANT TO Kent R. Ickler // Link-Local Multicast Name Resolution (LLMNR) This one is a biggie, and you’ve probably heard Jordan, John, me, and all the others say it many many times. LLMNR was (is) a protocol used that allowed name resolution without the requirement of a DNS server. It was (is) able to provide a hostname-to-IP HOME PAGE - BLACK HILLS INFORMATION SECURITYABOUT USCONTACTSERVICESBLOGRED TEAMINGHTOC Black Hills Information Security. “ Our main goal is not to prove that we can hack into a company but to help the customer develop a series of on-point solutions and technologies that will improve the overall security of the company. Testing should never be adversarial, but collaborative .”. – DARKNET - BLACK HILLS INFORMATION SECURITY Welcome Darknet Diaries Listeners! All of us at Black Hills Information Security thank you for checking out our most popular and upcoming free information security how-to videos, webcasts, and affordable training courses. If you haven’t listened to it yet, check out John Strand’s (Owner & Founder) Darknet Diaries Episode– 67: THE BIG
USING SDR TO BUILD A TRUNK TRACKER Ray Felch // Introduction Recently, I came across an interesting article on using software-defined radio (SDR) to create a Police, Fire, EMS, and Public Safety systems scanner. Viewing a few of these Trunk tracking scanners on Amazon, I quickly discovered that they are not cheap at all. You can spend several hundred dollars on a Trunked Radio tracking scanner; however, we BACKDOORS & BREACHES Edward Miro // Backdoors & Breaches is now available as an official Workshop Mod for Tabletop Simulator! Backdoors & Breaches (B&B) contains 52+ unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. This post is a guide for getting a virtual B&B game going. Note: Newattack,
BACKDOORS & BREACHES Welcome to Backdoors & Breaches, an Incident Response Card Game, from Black Hills Information Security and Active Countermeasures. Backdoors & Breaches contains 52 unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. We’re excited for you to play and learn from the game!Below you will find
GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably TRAINING SETUP INSTRUCTIONS Don't get left in the dark! Enter your email address and every time a post goes live you'll get an instant notification! We'll also add you to our webcast list, so you won't miss our occasional emails aboutupcoming events!
DARKNET - BLACK HILLS INFORMATION SECURITY Welcome Darknet Diaries Listeners! All of us at Black Hills Information Security thank you for checking out our most popular and upcoming free information security how-to videos, webcasts, and affordable training courses. If you haven’t listened to it yet, check out John Strand’s (Owner & Founder) Darknet Diaries Episode– 67: THE BIG
WEBCAST: OK, LET'S TALK ABOUT RANSOMWARE Watch on. 0:00. 0:00. 0:00 / 1:40:07. Live. •. This is a joint emergency webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand. There have been a couple of very scary ransomware stories in the news over the past few weeks. We figured it would be a goodidea
HOW TO REPLAY RF SIGNALS USING SDR Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your traffic. Preface: Recently, INTRO TO SOFTWARE DEFINED RADIO AND GSM/LTE Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your phone traffic. Preface: I held an Advanced Amateur Radio Operator NOW THAT’S WHAT I CALL ADHD! 4 Moth & James Marrs // Introduction After a month of hard work, Python headaches, dependency hell, and a bit of tool necromancy, ADHD4 is here and we’re thrilled to share it with the community! This version features tools upgraded from Python 2 to Python 3, a fancy new applications menu, updated/reorganized documentation, and more.What’s
WEBCAST: GETTING STARTED IN CYBER DECEPTION In this BHIS webcast, we will cover some basic, legal, and easy tools/techniques to get you started in working with low interaction honeypots to serve as an early warning of attacks. We will also be sharing a recipe for making wine out of pentester tears. Because attacker tears make the best wine.AN SMB RELAY RACE
NBT-NS and NBNS are the same thing and operate on UDP/137 and are also known as NetBIOS and WINS. These services are flawed by design and allow an easy attack path via response races; thus an SMB relay race. NBNS/NBT-NS (heretofore referred to as NBNS) is a fallback mechanism for name resolution. When a system is unable to identify a POKING HOLES IN THE FIREWALL: EGRESS TESTING WITH ALLPORTS Here is a short PowerShell portscanning script you can use to test ports 1-1024 against allports.exposed. Open up a command terminal. Type ‘powershell.exe -exec bypass’ and hit enter. Copy the below script into the terminal window and run it. HOW TO FIND AN INFOSEC MENTOR BB King // We got an email from a fan today asking how best to find a mentor in information security. Maybe you’re looking for a mentor too. It’s a great question. Much of the advice you see for people looking to make their start in infosec is something like, “Work atthe helpdesk or
HOME PAGE - BLACK HILLS INFORMATION SECURITYABOUT USCONTACTSERVICESBLOGRED TEAMINGHTOC Black Hills Information Security. “ Our main goal is not to prove that we can hack into a company but to help the customer develop a series of on-point solutions and technologies that will improve the overall security of the company. Testing should never be adversarial, but collaborative .”. – DARKNET - BLACK HILLS INFORMATION SECURITY Welcome Darknet Diaries Listeners! All of us at Black Hills Information Security thank you for checking out our most popular and upcoming free information security how-to videos, webcasts, and affordable training courses. If you haven’t listened to it yet, check out John Strand’s (Owner & Founder) Darknet Diaries Episode– 67: THE BIG
USING SDR TO BUILD A TRUNK TRACKER Ray Felch // Introduction Recently, I came across an interesting article on using software-defined radio (SDR) to create a Police, Fire, EMS, and Public Safety systems scanner. Viewing a few of these Trunk tracking scanners on Amazon, I quickly discovered that they are not cheap at all. You can spend several hundred dollars on a Trunked Radio tracking scanner; however, we BACKDOORS & BREACHES Edward Miro // Backdoors & Breaches is now available as an official Workshop Mod for Tabletop Simulator! Backdoors & Breaches (B&B) contains 52+ unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. This post is a guide for getting a virtual B&B game going. Note: Newattack,
BACKDOORS & BREACHES Welcome to Backdoors & Breaches, an Incident Response Card Game, from Black Hills Information Security and Active Countermeasures. Backdoors & Breaches contains 52 unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. We’re excited for you to play and learn from the game!Below you will find
GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably HOME PAGE - BLACK HILLS INFORMATION SECURITYABOUT USCONTACTSERVICESBLOGRED TEAMINGHTOC Black Hills Information Security. “ Our main goal is not to prove that we can hack into a company but to help the customer develop a series of on-point solutions and technologies that will improve the overall security of the company. Testing should never be adversarial, but collaborative .”. – DARKNET - BLACK HILLS INFORMATION SECURITY Welcome Darknet Diaries Listeners! All of us at Black Hills Information Security thank you for checking out our most popular and upcoming free information security how-to videos, webcasts, and affordable training courses. If you haven’t listened to it yet, check out John Strand’s (Owner & Founder) Darknet Diaries Episode– 67: THE BIG
USING SDR TO BUILD A TRUNK TRACKER Ray Felch // Introduction Recently, I came across an interesting article on using software-defined radio (SDR) to create a Police, Fire, EMS, and Public Safety systems scanner. Viewing a few of these Trunk tracking scanners on Amazon, I quickly discovered that they are not cheap at all. You can spend several hundred dollars on a Trunked Radio tracking scanner; however, we BACKDOORS & BREACHES Edward Miro // Backdoors & Breaches is now available as an official Workshop Mod for Tabletop Simulator! Backdoors & Breaches (B&B) contains 52+ unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. This post is a guide for getting a virtual B&B game going. Note: Newattack,
BACKDOORS & BREACHES Welcome to Backdoors & Breaches, an Incident Response Card Game, from Black Hills Information Security and Active Countermeasures. Backdoors & Breaches contains 52 unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. We’re excited for you to play and learn from the game!Below you will find
GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably TRAINING SETUP INSTRUCTIONS Don't get left in the dark! Enter your email address and every time a post goes live you'll get an instant notification! We'll also add you to our webcast list, so you won't miss our occasional emails aboutupcoming events!
DARKNET - BLACK HILLS INFORMATION SECURITY Welcome Darknet Diaries Listeners! All of us at Black Hills Information Security thank you for checking out our most popular and upcoming free information security how-to videos, webcasts, and affordable training courses. If you haven’t listened to it yet, check out John Strand’s (Owner & Founder) Darknet Diaries Episode– 67: THE BIG
WEBCAST: OK, LET'S TALK ABOUT RANSOMWARE Watch on. 0:00. 0:00. 0:00 / 1:40:07. Live. •. This is a joint emergency webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand. There have been a couple of very scary ransomware stories in the news over the past few weeks. We figured it would be a goodidea
ADHD - BLACK HILLS INFORMATION SECURITY Download ADHD. In the following webcast, John covers how to set up Active Directory Active Defense (ADAD) using tools in Active Defense Harbinger Distribution (ADHD). He shows how to create honey accounts, create callback word documents, and create fake SMB shares! YouTube. Black Hills Information Security. 23.8K subscribers. HOW TO REPLAY RF SIGNALS USING SDR Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your traffic. Preface: Recently, INTRO TO SOFTWARE DEFINED RADIO AND GSM/LTE Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your phone traffic. Preface: I held an Advanced Amateur Radio Operator NOW THAT’S WHAT I CALL ADHD! 4 Moth & James Marrs // Introduction After a month of hard work, Python headaches, dependency hell, and a bit of tool necromancy, ADHD4 is here and we’re thrilled to share it with the community! This version features tools upgraded from Python 2 to Python 3, a fancy new applications menu, updated/reorganized documentation, and more.What’s
AN SMB RELAY RACE
NBT-NS and NBNS are the same thing and operate on UDP/137 and are also known as NetBIOS and WINS. These services are flawed by design and allow an easy attack path via response races; thus an SMB relay race. NBNS/NBT-NS (heretofore referred to as NBNS) is a fallback mechanism for name resolution. When a system is unable to identify a POKING HOLES IN THE FIREWALL: EGRESS TESTING WITH ALLPORTS Here is a short PowerShell portscanning script you can use to test ports 1-1024 against allports.exposed. Open up a command terminal. Type ‘powershell.exe -exec bypass’ and hit enter. Copy the below script into the terminal window and run it. HOW TO FIND AN INFOSEC MENTOR BB King // We got an email from a fan today asking how best to find a mentor in information security. Maybe you’re looking for a mentor too. It’s a great question. Much of the advice you see for people looking to make their start in infosec is something like, “Work atthe helpdesk or
HOME PAGE - BLACK HILLS INFORMATION SECURITYABOUT USCONTACTSERVICESBLOGRED TEAMINGHTOC We specialize in penetration testing, red teaming, and threat hunting. Let us help you find the holes in your security. USING SDR TO BUILD A TRUNK TRACKER Ray Felch // Introduction Recently, I came across an interesting article on using software-defined radio (SDR) to create a Police, Fire, EMS, and Public Safety systems scanner. Viewing a few of these Trunk tracking scanners on Amazon, I quickly discovered that they are not cheap at all. You can spend several hundred dollars on a Trunked Radio tracking scanner; however, we BACKDOORS & BREACHES Welcome to Backdoors & Breaches, an Incident Response Card Game, from Black Hills Information Security and Active Countermeasures. Backdoors & Breaches contains 52 unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. We’re excited for you to play and learn from the game!Below you will find
DARKNET - BLACK HILLS INFORMATION SECURITY How to Job Hunt like a Hacker – How to use the hacker mindset to find the work you want to do. w/ Jason Blanchard @BanjoCrashland; 60minutes
BACKDOORS & BREACHES Edward Miro // Backdoors & Breaches is now available as an official Workshop Mod for Tabletop Simulator! Backdoors & Breaches (B&B) contains 52+ unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. This post is a guide for getting a virtual B&B game going. Note: Newattack,
GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably DETECTING MALWARE BEACONS WITH ZEEK AND RITA Hello and welcome, my name is John Strand and in this video, we’re going to be talking a little bit about beaconing using RITA. Now, for this particular video, I’m not using the security onion, instead we’re going to be using ADHD. If you want to find ADHD, go to the ActiveCountermeasures.com website. Go to HOW TO REPLAY RF SIGNALS USING SDR Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your traffic. Preface: Recently, TRACKING ATTACKERS WITH WORD WEB BUGS (CYBER DECEPTION So, let’s actually go through how a Word Web Bug document works. Now in this particular video, we’re using the Active Defense Harbinger Distribution.This is the distribution I use for my class on cyber deception at Wild West Hackin’ Fest, both in San Diego and in Deadwood, South Dakota, and I also use it for whenever I teach that class at BlackHat, the four-day version of that class. HOW TO DISABLE LLMNR & WHY YOU WANT TO Kent R. Ickler // Link-Local Multicast Name Resolution (LLMNR) This one is a biggie, and you’ve probably heard Jordan, John, me, and all the others say it many many times. LLMNR was (is) a protocol used that allowed name resolution without the requirement of a DNS server. It was (is) able to provide a hostname-to-IP HOME PAGE - BLACK HILLS INFORMATION SECURITYABOUT USCONTACTSERVICESBLOGRED TEAMINGHTOC We specialize in penetration testing, red teaming, and threat hunting. Let us help you find the holes in your security. USING SDR TO BUILD A TRUNK TRACKER Ray Felch // Introduction Recently, I came across an interesting article on using software-defined radio (SDR) to create a Police, Fire, EMS, and Public Safety systems scanner. Viewing a few of these Trunk tracking scanners on Amazon, I quickly discovered that they are not cheap at all. You can spend several hundred dollars on a Trunked Radio tracking scanner; however, we BACKDOORS & BREACHES Welcome to Backdoors & Breaches, an Incident Response Card Game, from Black Hills Information Security and Active Countermeasures. Backdoors & Breaches contains 52 unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. We’re excited for you to play and learn from the game!Below you will find
DARKNET - BLACK HILLS INFORMATION SECURITY How to Job Hunt like a Hacker – How to use the hacker mindset to find the work you want to do. w/ Jason Blanchard @BanjoCrashland; 60minutes
BACKDOORS & BREACHES Edward Miro // Backdoors & Breaches is now available as an official Workshop Mod for Tabletop Simulator! Backdoors & Breaches (B&B) contains 52+ unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. This post is a guide for getting a virtual B&B game going. Note: Newattack,
GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably DETECTING MALWARE BEACONS WITH ZEEK AND RITA Hello and welcome, my name is John Strand and in this video, we’re going to be talking a little bit about beaconing using RITA. Now, for this particular video, I’m not using the security onion, instead we’re going to be using ADHD. If you want to find ADHD, go to the ActiveCountermeasures.com website. Go to HOW TO REPLAY RF SIGNALS USING SDR Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your traffic. Preface: Recently, TRACKING ATTACKERS WITH WORD WEB BUGS (CYBER DECEPTION So, let’s actually go through how a Word Web Bug document works. Now in this particular video, we’re using the Active Defense Harbinger Distribution.This is the distribution I use for my class on cyber deception at Wild West Hackin’ Fest, both in San Diego and in Deadwood, South Dakota, and I also use it for whenever I teach that class at BlackHat, the four-day version of that class. HOW TO DISABLE LLMNR & WHY YOU WANT TO Kent R. Ickler // Link-Local Multicast Name Resolution (LLMNR) This one is a biggie, and you’ve probably heard Jordan, John, me, and all the others say it many many times. LLMNR was (is) a protocol used that allowed name resolution without the requirement of a DNS server. It was (is) able to provide a hostname-to-IP TRAINING SETUP INSTRUCTIONS Don't get left in the dark! Enter your email address and every time a post goes live you'll get an instant notification! We'll also add you to our webcast list, so you won't miss our occasional emails aboutupcoming events!
DARKNET - BLACK HILLS INFORMATION SECURITY How to Job Hunt like a Hacker – How to use the hacker mindset to find the work you want to do. w/ Jason Blanchard @BanjoCrashland; 60minutes
WEBCAST: OK, LET'S TALK ABOUT RANSOMWARE This is a joint emergency webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand. There have been a couple of very scary ransomware stories in the news over the past few weeks. We figured it would be a good idea to throw a quick HOW TO REPLAY RF SIGNALS USING SDR Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your traffic. Preface: Recently, NOW THAT’S WHAT I CALL ADHD! 4 Moth & James Marrs // Introduction After a month of hard work, Python headaches, dependency hell, and a bit of tool necromancy, ADHD4 is here and we’re thrilled to share it with the community! This version features tools upgraded from Python 2 to Python 3, a fancy new applications menu, updated/reorganized documentation, and more.What’s
HOME NETWORK DESIGN
Ethan Robish // In this series of posts, I’ll discuss how I segmented my home network using VLANs and how I moved away from using a risky consumer-grade router at the edge of my network. My goal for this series is to take you from using a consumer-grade router runninga flat network to a
INTRO TO SOFTWARE DEFINED RADIO AND GSM/LTE Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your phone traffic. Preface: I held an Advanced Amateur Radio Operator POKING HOLES IN THE FIREWALL: EGRESS TESTING WITH ALLPORTS Beau Bullock // If you have been even remotely in touch with technology in the past thirty years you have probably heard of this thing called a “firewall”. If not, a “firewall” decides what does and does not get to proceed through it. Most organizations haveone of
AN SMB RELAY RACE
We also went ahead and downloaded the global address list with the following command. Get-GlobalAddressList -ExchHostname mail.domain.com -UserName wlabv2\maxine.james HOW TO: C2 OVER ICMP In order to get my ICMP C2 to work, I had to disable machine-based ICMP. I was able to do this by using the following command. HOME PAGE - BLACK HILLS INFORMATION SECURITYABOUT USCONTACTSERVICESBLOGRED TEAMINGHTOC Black Hills Information Security. “ Our main goal is not to prove that we can hack into a company but to help the customer develop a series of on-point solutions and technologies that will improve the overall security of the company. Testing should never be adversarial, but collaborative .”. – USING SDR TO BUILD A TRUNK TRACKER Ray Felch // Introduction Recently, I came across an interesting article on using software-defined radio (SDR) to create a Police, Fire, EMS, and Public Safety systems scanner. Viewing a few of these Trunk tracking scanners on Amazon, I quickly discovered that they are not cheap at all. You can spend several hundred dollars on a Trunked Radio tracking scanner; however, we WEBCAST: OK, LET'S TALK ABOUT RANSOMWARE Watch on. 0:00. 0:00. 0:00 / 1:40:07. Live. •. This is a joint emergency webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand. There have been a couple of very scary ransomware stories in the news over the past few weeks. We figured it would be a goodidea
HOW TO REPLAY RF SIGNALS USING SDR Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your traffic. Preface: Recently, INTRO TO SOFTWARE DEFINED RADIO AND GSM/LTE Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your phone traffic. Preface: I held an Advanced Amateur Radio Operator DETECTING MALWARE BEACONS WITH ZEEK AND RITA The first one I’m going to talk about is beacons. We’ll talk a little bit about what it means to be a beacon for these things. Here, you can see that we have a source IP address of 10.234.234.100 and a destination IP address of 138.197.117.74. You can also see that there was 4,532 connections. GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably HOW TO DISABLE LLMNR & WHY YOU WANT TO Kent R. Ickler // Link-Local Multicast Name Resolution (LLMNR) This one is a biggie, and you’ve probably heard Jordan, John, me, and all the others say it many many times. LLMNR was (is) a protocol used that allowed name resolution without the requirement of a DNS server. It was (is) able to provide a hostname-to-IPI HATE RANSOMWARE.
Black Hills Information Security | @BHInfoSecurity I Hate Ransomware. And, you should too! John Strand SOC ANALYST KEY SKILLS GETTING STARTED WITH BHIS Black Hills Information Security | @BHInfoSecurity Getting Started With BHIS: SOC Analyst Key Skills John Strand HOME PAGE - BLACK HILLS INFORMATION SECURITYABOUT USCONTACTSERVICESBLOGRED TEAMINGHTOC Black Hills Information Security. “ Our main goal is not to prove that we can hack into a company but to help the customer develop a series of on-point solutions and technologies that will improve the overall security of the company. Testing should never be adversarial, but collaborative .”. – USING SDR TO BUILD A TRUNK TRACKER Ray Felch // Introduction Recently, I came across an interesting article on using software-defined radio (SDR) to create a Police, Fire, EMS, and Public Safety systems scanner. Viewing a few of these Trunk tracking scanners on Amazon, I quickly discovered that they are not cheap at all. You can spend several hundred dollars on a Trunked Radio tracking scanner; however, we WEBCAST: OK, LET'S TALK ABOUT RANSOMWARE Watch on. 0:00. 0:00. 0:00 / 1:40:07. Live. •. This is a joint emergency webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand. There have been a couple of very scary ransomware stories in the news over the past few weeks. We figured it would be a goodidea
HOW TO REPLAY RF SIGNALS USING SDR Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your traffic. Preface: Recently, INTRO TO SOFTWARE DEFINED RADIO AND GSM/LTE Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your phone traffic. Preface: I held an Advanced Amateur Radio Operator DETECTING MALWARE BEACONS WITH ZEEK AND RITA The first one I’m going to talk about is beacons. We’ll talk a little bit about what it means to be a beacon for these things. Here, you can see that we have a source IP address of 10.234.234.100 and a destination IP address of 138.197.117.74. You can also see that there was 4,532 connections. GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably HOW TO DISABLE LLMNR & WHY YOU WANT TO Kent R. Ickler // Link-Local Multicast Name Resolution (LLMNR) This one is a biggie, and you’ve probably heard Jordan, John, me, and all the others say it many many times. LLMNR was (is) a protocol used that allowed name resolution without the requirement of a DNS server. It was (is) able to provide a hostname-to-IPI HATE RANSOMWARE.
Black Hills Information Security | @BHInfoSecurity I Hate Ransomware. And, you should too! John Strand SOC ANALYST KEY SKILLS GETTING STARTED WITH BHIS Black Hills Information Security | @BHInfoSecurity Getting Started With BHIS: SOC Analyst Key Skills John Strand TRAINING SETUP INSTRUCTIONS Don't get left in the dark! Enter your email address and every time a post goes live you'll get an instant notification! We'll also add you to our webcast list, so you won't miss our occasional emails aboutupcoming events!
DARKNET - BLACK HILLS INFORMATION SECURITY Welcome Darknet Diaries Listeners! All of us at Black Hills Information Security thank you for checking out our most popular and upcoming free information security how-to videos, webcasts, and affordable training courses. If you haven’t listened to it yet, check out John Strand’s (Owner & Founder) Darknet Diaries Episode– 67: THE BIG
GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably RITA - BLACK HILLS INFORMATION SECURITY RITA Real Intelligence Threat Analytics This project, born from BHIS, is now developed, funded and supported by Active Countermeasures Download RITA here RITA on Security Weekly with John Strand John does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to get NOW THAT’S WHAT I CALL ADHD! 4 Moth & James Marrs // Introduction After a month of hard work, Python headaches, dependency hell, and a bit of tool necromancy, ADHD4 is here and we’re thrilled to share it with the community! This version features tools upgraded from Python 2 to Python 3, a fancy new applications menu, updated/reorganized documentation, and more.What’s
AN SMB RELAY RACE
NBT-NS and NBNS are the same thing and operate on UDP/137 and are also known as NetBIOS and WINS. These services are flawed by design and allow an easy attack path via response races; thus an SMB relay race. NBNS/NBT-NS (heretofore referred to as NBNS) is a fallback mechanism for name resolution. When a system is unable to identify a HOW TO BYPASS ANTI-VIRUS TO RUN MIMIKATZ Uploading the Invoke-Mimikatz.ps1 file to VirusTotal showed that 19 of 54 AV vendors currently detect this file as malicious. AV Detection Rate for Unmodified Mimikatz Script. While uploading to VirusTotal is not a conclusive way to determine if a malicious file will be detected, it can hint to what AV may be triggering on. HOW TO FIX A MISSING CONTENT-SECURITY-POLICY ON A WEBSITE Kent Ickler // Content-Security-Policy-What-What? Content-Security-Policy is a security header that can (and should) be included on communication from your website’s server to a client. When a user goes to your website, headers are used for the client and server to exchange information about the browsing session. This is typically all done in the background unbeknownst DUMPING FIRMWARE WITH THE CH341A PROGRAMMER Rick Wisser // Note: This blog will also be a lab for any of the upcoming Wild West Hackin’ Fest Conferences. During a recent engagement, I came across an issue. The issue I encountered was that the SPI chip I was trying to dump the firmware off of was a 1.8v chip.This would not
SOC ANALYST KEY SKILLS GETTING STARTED WITH BHIS Black Hills Information Security | @BHInfoSecurity Getting Started With BHIS: SOC Analyst Key Skills John Strand HOME PAGE - BLACK HILLS INFORMATION SECURITYABOUT USCONTACTSERVICESBLOGRED TEAMINGHTOC Black Hills Information Security. “ Our main goal is not to prove that we can hack into a company but to help the customer develop a series of on-point solutions and technologies that will improve the overall security of the company. Testing should never be adversarial, but collaborative .”. – USING SDR TO BUILD A TRUNK TRACKER Ray Felch // Introduction Recently, I came across an interesting article on using software-defined radio (SDR) to create a Police, Fire, EMS, and Public Safety systems scanner. Viewing a few of these Trunk tracking scanners on Amazon, I quickly discovered that they are not cheap at all. You can spend several hundred dollars on a Trunked Radio tracking scanner; however, we WEBCAST: OK, LET'S TALK ABOUT RANSOMWARE Watch on. 0:00. 0:00. 0:00 / 1:40:07. Live. •. This is a joint emergency webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand. There have been a couple of very scary ransomware stories in the news over the past few weeks. We figured it would be a goodidea
HOW TO REPLAY RF SIGNALS USING SDR Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your traffic. Preface: Recently, INTRO TO SOFTWARE DEFINED RADIO AND GSM/LTE Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your phone traffic. Preface: I held an Advanced Amateur Radio Operator DETECTING MALWARE BEACONS WITH ZEEK AND RITA The first one I’m going to talk about is beacons. We’ll talk a little bit about what it means to be a beacon for these things. Here, you can see that we have a source IP address of 10.234.234.100 and a destination IP address of 138.197.117.74. You can also see that there was 4,532 connections. GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably HOW TO DISABLE LLMNR & WHY YOU WANT TO Kent R. Ickler // Link-Local Multicast Name Resolution (LLMNR) This one is a biggie, and you’ve probably heard Jordan, John, me, and all the others say it many many times. LLMNR was (is) a protocol used that allowed name resolution without the requirement of a DNS server. It was (is) able to provide a hostname-to-IPI HATE RANSOMWARE.
Black Hills Information Security | @BHInfoSecurity I Hate Ransomware. And, you should too! John Strand SOC ANALYST KEY SKILLS GETTING STARTED WITH BHIS Black Hills Information Security | @BHInfoSecurity Getting Started With BHIS: SOC Analyst Key Skills John Strand HOME PAGE - BLACK HILLS INFORMATION SECURITYABOUT USCONTACTSERVICESBLOGRED TEAMINGHTOC Black Hills Information Security. “ Our main goal is not to prove that we can hack into a company but to help the customer develop a series of on-point solutions and technologies that will improve the overall security of the company. Testing should never be adversarial, but collaborative .”. – USING SDR TO BUILD A TRUNK TRACKER Ray Felch // Introduction Recently, I came across an interesting article on using software-defined radio (SDR) to create a Police, Fire, EMS, and Public Safety systems scanner. Viewing a few of these Trunk tracking scanners on Amazon, I quickly discovered that they are not cheap at all. You can spend several hundred dollars on a Trunked Radio tracking scanner; however, we WEBCAST: OK, LET'S TALK ABOUT RANSOMWARE Watch on. 0:00. 0:00. 0:00 / 1:40:07. Live. •. This is a joint emergency webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand. There have been a couple of very scary ransomware stories in the news over the past few weeks. We figured it would be a goodidea
HOW TO REPLAY RF SIGNALS USING SDR Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your traffic. Preface: Recently, INTRO TO SOFTWARE DEFINED RADIO AND GSM/LTE Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your phone traffic. Preface: I held an Advanced Amateur Radio Operator DETECTING MALWARE BEACONS WITH ZEEK AND RITA The first one I’m going to talk about is beacons. We’ll talk a little bit about what it means to be a beacon for these things. Here, you can see that we have a source IP address of 10.234.234.100 and a destination IP address of 138.197.117.74. You can also see that there was 4,532 connections. GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably HOW TO DISABLE LLMNR & WHY YOU WANT TO Kent R. Ickler // Link-Local Multicast Name Resolution (LLMNR) This one is a biggie, and you’ve probably heard Jordan, John, me, and all the others say it many many times. LLMNR was (is) a protocol used that allowed name resolution without the requirement of a DNS server. It was (is) able to provide a hostname-to-IPI HATE RANSOMWARE.
Black Hills Information Security | @BHInfoSecurity I Hate Ransomware. And, you should too! John Strand SOC ANALYST KEY SKILLS GETTING STARTED WITH BHIS Black Hills Information Security | @BHInfoSecurity Getting Started With BHIS: SOC Analyst Key Skills John Strand TRAINING SETUP INSTRUCTIONS Don't get left in the dark! Enter your email address and every time a post goes live you'll get an instant notification! We'll also add you to our webcast list, so you won't miss our occasional emails aboutupcoming events!
BACKDOORS & BREACHES Welcome to Backdoors & Breaches, an Incident Response Card Game, from Black Hills Information Security and Active Countermeasures. Backdoors & Breaches contains 52 unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. We’re excited for you to play and learn from the game!Below you will find
GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probablyAN SMB RELAY RACE
NBT-NS and NBNS are the same thing and operate on UDP/137 and are also known as NetBIOS and WINS. These services are flawed by design and allow an easy attack path via response races; thus an SMB relay race. NBNS/NBT-NS (heretofore referred to as NBNS) is a fallback mechanism for name resolution. When a system is unable to identify a POWERSHELL WITHOUT POWERSHELL Brian Fehrman (With shout outs to: Kelsey Bellew, Beau Bullock) //. In a previous blog post, we talked about bypassing AV and Application Whitelisting by using a method developed by Casey Smith.In a recent engagement, we ran into an environment with even more restrictions in place. Not only did they have AV and Application Whitelisting, but they were also blocking the use of PowerShell and HOW TO FIX A MISSING CONTENT-SECURITY-POLICY ON A WEBSITE Kent Ickler // Content-Security-Policy-What-What? Content-Security-Policy is a security header that can (and should) be included on communication from your website’s server to a client. When a user goes to your website, headers are used for the client and server to exchange information about the browsing session. This is typically all done in the background unbeknownstI HATE RANSOMWARE.
Black Hills Information Security | @BHInfoSecurity I Hate Ransomware. And, you should too! John Strand DUMPING FIRMWARE WITH THE CH341A PROGRAMMER Rick Wisser // Note: This blog will also be a lab for any of the upcoming Wild West Hackin’ Fest Conferences. During a recent engagement, I came across an issue. The issue I encountered was that the SPI chip I was trying to dump the firmware off of was a 1.8v chip.This would not
HOW TO INCREASE THE MINIMUM CHARACTER PASSWORD LENGTH (15 History Lesson for the Post-Millennials. Back in Windows 95/98 days, passwords were stored using the LM Hash. The LM hash method was secure in its day– a password would be same-cased, padded to 14 characters, broken into two 7 character halves, and HOW TO BYPASS ANTI-VIRUS TO RUN MIMIKATZ Uploading the Invoke-Mimikatz.ps1 file to VirusTotal showed that 19 of 54 AV vendors currently detect this file as malicious. AV Detection Rate for Unmodified Mimikatz Script. While uploading to VirusTotal is not a conclusive way to determine if a malicious file will be detected, it can hint to what AV may be triggering on. HOME PAGE - BLACK HILLS INFORMATION SECURITYABOUT USCONTACTSERVICESBLOGRED TEAMINGHTOC Black Hills Information Security. “ Our main goal is not to prove that we can hack into a company but to help the customer develop a series of on-point solutions and technologies that will improve the overall security of the company. Testing should never be adversarial, but collaborative .”. – John Strand, Owner. DARKNET - BLACK HILLS INFORMATION SECURITY Welcome Darknet Diaries Listeners! All of us at Black Hills Information Security thank you for checking out our most popular and upcoming free information security how-to videos, webcasts, and affordable training courses. If you haven’t listened to it yet, check out John Strand’s (Owner & Founder) Darknet Diaries Episode– 67: THE BIG
USING SDR TO BUILD A TRUNK TRACKER Ray Felch // Introduction Recently, I came across an interesting article on using software-defined radio (SDR) to create a Police, Fire, EMS, and Public Safety systems scanner. Viewing a few of these Trunk tracking scanners on Amazon, I quickly discovered that they are not cheap at all. You can spend several hundred dollars on a Trunked Radio tracking scanner; however, we BACKDOORS & BREACHES Welcome to Backdoors & Breaches, an Incident Response Card Game, from Black Hills Information Security and Active Countermeasures. Backdoors & Breaches contains 52 unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. We’re excited for you to play and learn from the game!Below you will find
BACKDOORS & BREACHES Edward Miro // Backdoors & Breaches is now available as an official Workshop Mod for Tabletop Simulator! Backdoors & Breaches (B&B) contains 52+ unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. This post is a guide for getting a virtual B&B game going. Note: Newattack,
GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably BREACHING THE CLOUD PERIMETER W/ BEAU BULLOCK Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. In this free 4-hour workshop, hacking concepts are introduced for each of those services. Learn how to perform reconnaissance against WEBCAST: SACRED CASH COW TIPPING 2020 The goal of this webcast is to help show people that there is still no silver bullet in security. We also desperately want to show that configuration and monitoring still matters. This is our first webcast of the year. It may run longer than 60 minutes. It will be recorded. DETECTING MALWARE BEACONS WITH ZEEK AND RITA The first one I’m going to talk about is beacons. We’ll talk a little bit about what it means to be a beacon for these things. Here, you can see that we have a source IP address of 10.234.234.100 and a destination IP address of 138.197.117.74. You can also see that there was 4,532 connections. HOW TO DISABLE LLMNR & WHY YOU WANT TO Kent R. Ickler // Link-Local Multicast Name Resolution (LLMNR) This one is a biggie, and you’ve probably heard Jordan, John, me, and all the others say it many many times. LLMNR was (is) a protocol used that allowed name resolution without the requirement of a DNS server. It was (is) able to provide a hostname-to-IP HOME PAGE - BLACK HILLS INFORMATION SECURITYABOUT USCONTACTSERVICESBLOGRED TEAMINGHTOC Black Hills Information Security. “ Our main goal is not to prove that we can hack into a company but to help the customer develop a series of on-point solutions and technologies that will improve the overall security of the company. Testing should never be adversarial, but collaborative .”. – John Strand, Owner. DARKNET - BLACK HILLS INFORMATION SECURITY Welcome Darknet Diaries Listeners! All of us at Black Hills Information Security thank you for checking out our most popular and upcoming free information security how-to videos, webcasts, and affordable training courses. If you haven’t listened to it yet, check out John Strand’s (Owner & Founder) Darknet Diaries Episode– 67: THE BIG
USING SDR TO BUILD A TRUNK TRACKER Ray Felch // Introduction Recently, I came across an interesting article on using software-defined radio (SDR) to create a Police, Fire, EMS, and Public Safety systems scanner. Viewing a few of these Trunk tracking scanners on Amazon, I quickly discovered that they are not cheap at all. You can spend several hundred dollars on a Trunked Radio tracking scanner; however, we BACKDOORS & BREACHES Welcome to Backdoors & Breaches, an Incident Response Card Game, from Black Hills Information Security and Active Countermeasures. Backdoors & Breaches contains 52 unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. We’re excited for you to play and learn from the game!Below you will find
BACKDOORS & BREACHES Edward Miro // Backdoors & Breaches is now available as an official Workshop Mod for Tabletop Simulator! Backdoors & Breaches (B&B) contains 52+ unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. This post is a guide for getting a virtual B&B game going. Note: Newattack,
GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably BREACHING THE CLOUD PERIMETER W/ BEAU BULLOCK Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. In this free 4-hour workshop, hacking concepts are introduced for each of those services. Learn how to perform reconnaissance against WEBCAST: SACRED CASH COW TIPPING 2020 The goal of this webcast is to help show people that there is still no silver bullet in security. We also desperately want to show that configuration and monitoring still matters. This is our first webcast of the year. It may run longer than 60 minutes. It will be recorded. DETECTING MALWARE BEACONS WITH ZEEK AND RITA The first one I’m going to talk about is beacons. We’ll talk a little bit about what it means to be a beacon for these things. Here, you can see that we have a source IP address of 10.234.234.100 and a destination IP address of 138.197.117.74. You can also see that there was 4,532 connections. HOW TO DISABLE LLMNR & WHY YOU WANT TO Kent R. Ickler // Link-Local Multicast Name Resolution (LLMNR) This one is a biggie, and you’ve probably heard Jordan, John, me, and all the others say it many many times. LLMNR was (is) a protocol used that allowed name resolution without the requirement of a DNS server. It was (is) able to provide a hostname-to-IP TRAINING SETUP INSTRUCTIONS Don't get left in the dark! Enter your email address and every time a post goes live you'll get an instant notification! We'll also add you to our webcast list, so you won't miss our occasional emails aboutupcoming events!
ACTIVE SOC - BLACK HILLS INFORMATION SECURITY To help address these issues, Black Hills Information Security has developed an Active SOC approach to securing our customers. BHIS performs an Active Directory Review to help our Active SOC customers start in a more secure position, to help reduce paths available to attackers, and to limit excess noise. INTRO TO SOFTWARE DEFINED RADIO AND GSM/LTE Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your phone traffic. Preface: I held an Advanced Amateur Radio Operator HOW TO REPLAY RF SIGNALS USING SDR Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, intercepting and decrypting someone else’s data is illegal, so be careful when researching your traffic. Preface: Recently, TRACKING ATTACKERS WITH WORD WEB BUGS (CYBER DECEPTION So, let’s actually go through how a Word Web Bug document works. Now in this particular video, we’re using the Active Defense Harbinger Distribution.This is the distribution I use for my class on cyber deception at Wild West Hackin’ Fest, both in San Diego and in Deadwood, South Dakota, and I also use it for whenever I teach that class at BlackHat, the four-day version of that class.HOME NETWORK DESIGN
This is definitely the “easy” button and won’t let us understand the inner workings very well. 2. Wireless Routers in Parallel – This setup gets a little more complicated, but it is basically two copies of the flat network setup. It involves a separate wireless router forI HATE RANSOMWARE.
Black Hills Information Security | @BHInfoSecurity I Hate Ransomware. And, you should too! John StrandAN SMB RELAY RACE
NBT-NS and NBNS are the same thing and operate on UDP/137 and are also known as NetBIOS and WINS. These services are flawed by design and allow an easy attack path via response races; thus an SMB relay race. NBNS/NBT-NS (heretofore referred to as NBNS) is a fallback mechanism for name resolution. When a system is unable to identify a BREACHING THE CLOUD SETUP INSTRUCTIONS Breaching the Cloud Setup Instructions This document serves as prerequisite information related to the Breaching the Cloud training. There are some items that need to be set up prior to the training by each attendee in order to have success with the labs. You will need a computer that can run two (2) virtual machines GETTING STARTED WITH APPLOCKER John Strand // I have quite a few calls with customers who do not know where to begin when it comes to application whitelisting. Often, the approach some organizations take is to try and implement full application whitelisting on every single application across their entire environment. While this goal is fun and seems like a HOME PAGE - BLACK HILLS INFORMATION SECURITYABOUT USCONTACTSERVICESBLOGRED TEAMINGHTOC Black Hills Information Security. “ Our main goal is not to prove that we can hack into a company but to help the customer develop a series of on-point solutions and technologies that will improve the overall security of the company. Testing should never be adversarial, but collaborative .”. – John Strand, Owner. DARKNET - BLACK HILLS INFORMATION SECURITYBLACK HILLS INFORMATION SECURITYBLACK HILLS INFORMATION SECURITY LLCBLACK HILLS SECURITYBLACK HILLS INFOSEC DISCORDBLACK HILLS PEN TESTBLACK HILLS SECURITY BLOG Welcome Darknet Diaries Listeners! All of us at Black Hills Information Security thank you for checking out our most popular and upcoming free information security how-to videos, webcasts, and affordable training courses. If you haven’t listened to it yet, check out John Strand’s (Owner & Founder) Darknet Diaries Episode– 67: THE BIG
BACKDOORS & BREACHES Welcome to Backdoors & Breaches, an Incident Response Card Game, from Black Hills Information Security and Active Countermeasures. Backdoors & Breaches contains 52 unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. We’re excited for you to play and learn from the game!Below you will find
RITA - BLACK HILLS INFORMATION SECURITY RITA Real Intelligence Threat Analytics This project, born from BHIS, is now developed, funded and supported by Active Countermeasures Download RITA here RITA on Security Weekly with John Strand John does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to getCYBER RANGE
BHIS Antisyphon Cyber Range The skills gap and funding to train new Security Operations Center (SOC) personnel is becoming difficult for organizations to bridge. Oftentimes, well-intentioned organizations do not have the means to confidently operate in a perpetually understaffed mode. Cybersecurity teams may lack advanced skills in areas like security analytics or forensic investigations GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably WEBCAST: SACRED CASH COW TIPPING 2020 The goal of this webcast is to help show people that there is still no silver bullet in security. We also desperately want to show that configuration and monitoring still matters. This is our first webcast of the year. It may run longer than 60 minutes. It will be recorded. BREACHING THE CLOUD PERIMETER W/ BEAU BULLOCK Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. In this free 4-hour workshop, hacking concepts are introduced for each of those services. Learn how to perform reconnaissance against HOW TO DISABLE LLMNR & WHY YOU WANT TO Kent R. Ickler // Link-Local Multicast Name Resolution (LLMNR) This one is a biggie, and you’ve probably heard Jordan, John, me, and all the others say it many many times. LLMNR was (is) a protocol used that allowed name resolution without the requirement of a DNS server. It was (is) able to provide a hostname-to-IP HOW TO: C2 OVER ICMP In order to get my ICMP C2 to work, I had to disable machine-based ICMP. I was able to do this by using the following command. HOME PAGE - BLACK HILLS INFORMATION SECURITYABOUT USCONTACTSERVICESBLOGRED TEAMINGHTOC Black Hills Information Security. “ Our main goal is not to prove that we can hack into a company but to help the customer develop a series of on-point solutions and technologies that will improve the overall security of the company. Testing should never be adversarial, but collaborative .”. – John Strand, Owner. DARKNET - BLACK HILLS INFORMATION SECURITYBLACK HILLS INFORMATION SECURITYBLACK HILLS INFORMATION SECURITY LLCBLACK HILLS SECURITYBLACK HILLS INFOSEC DISCORDBLACK HILLS PEN TESTBLACK HILLS SECURITY BLOG Welcome Darknet Diaries Listeners! All of us at Black Hills Information Security thank you for checking out our most popular and upcoming free information security how-to videos, webcasts, and affordable training courses. If you haven’t listened to it yet, check out John Strand’s (Owner & Founder) Darknet Diaries Episode– 67: THE BIG
BACKDOORS & BREACHES Welcome to Backdoors & Breaches, an Incident Response Card Game, from Black Hills Information Security and Active Countermeasures. Backdoors & Breaches contains 52 unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. We’re excited for you to play and learn from the game!Below you will find
RITA - BLACK HILLS INFORMATION SECURITY RITA Real Intelligence Threat Analytics This project, born from BHIS, is now developed, funded and supported by Active Countermeasures Download RITA here RITA on Security Weekly with John Strand John does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to getCYBER RANGE
BHIS Antisyphon Cyber Range The skills gap and funding to train new Security Operations Center (SOC) personnel is becoming difficult for organizations to bridge. Oftentimes, well-intentioned organizations do not have the means to confidently operate in a perpetually understaffed mode. Cybersecurity teams may lack advanced skills in areas like security analytics or forensic investigations GETTING POWERSHELL EMPIRE PAST WINDOWS DEFENDER Replace with the base64 string output produced by Empire’s multi/launcher (the stuff after “powershell -noP -sta -w 1 -enc”, including any equals signs at the end).. You will find Launcher.exe in the Output directory. Move this to your victim system and voila! You have gotten past Windows Defender. However, in a corporate environment, this is probably WEBCAST: SACRED CASH COW TIPPING 2020 The goal of this webcast is to help show people that there is still no silver bullet in security. We also desperately want to show that configuration and monitoring still matters. This is our first webcast of the year. It may run longer than 60 minutes. It will be recorded. BREACHING THE CLOUD PERIMETER W/ BEAU BULLOCK Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. In this free 4-hour workshop, hacking concepts are introduced for each of those services. Learn how to perform reconnaissance against HOW TO DISABLE LLMNR & WHY YOU WANT TO Kent R. Ickler // Link-Local Multicast Name Resolution (LLMNR) This one is a biggie, and you’ve probably heard Jordan, John, me, and all the others say it many many times. LLMNR was (is) a protocol used that allowed name resolution without the requirement of a DNS server. It was (is) able to provide a hostname-to-IP HOW TO: C2 OVER ICMP In order to get my ICMP C2 to work, I had to disable machine-based ICMP. I was able to do this by using the following command. BLACK HILLS INFORMATION SECURITY PENETRATION TESTING Black Hills Information Security and Active Countermeasures believe that it is worthwhile to assume you have already suffered a compromise. Using that assumption, start hunting for attackers who have successfully flown under the radar. Hunt Teaming with AI-Hunter is an activity where we search for attackers who successfully useevasion
AN SMB RELAY RACE
NBT-NS and NBNS are the same thing and operate on UDP/137 and are also known as NetBIOS and WINS. These services are flawed by design and allow an easy attack path via response races; thus an SMB relay race. NBNS/NBT-NS (heretofore referred to as NBNS) is a fallback mechanism for name resolution. When a system is unable to identify aHOME NETWORK DESIGN
This is definitely the “easy” button and won’t let us understand the inner workings very well. 2. Wireless Routers in Parallel – This setup gets a little more complicated, but it is basically two copies of the flat network setup. It involves a separate wireless router for TRACKING ATTACKERS WITH WORD WEB BUGS (CYBER DECEPTION So, let’s actually go through how a Word Web Bug document works. Now in this particular video, we’re using the Active Defense Harbinger Distribution.This is the distribution I use for my class on cyber deception at Wild West Hackin’ Fest, both in San Diego and in Deadwood, South Dakota, and I also use it for whenever I teach that class at BlackHat, the four-day version of that class. HOW TO FIX A MISSING CONTENT-SECURITY-POLICY ON A WEBSITE Kent Ickler // Content-Security-Policy-What-What? Content-Security-Policy is a security header that can (and should) be included on communication from your website’s server to a client. When a user goes to your website, headers are used for the client and server to exchange information about the browsing session. This is typically all done in the background unbeknownst NOW THAT’S WHAT I CALL ADHD! 4 Moth & James Marrs // Introduction After a month of hard work, Python headaches, dependency hell, and a bit of tool necromancy, ADHD4 is here and we’re thrilled to share it with the community! This version features tools upgraded from Python 2 to Python 3, a fancy new applications menu, updated/reorganized documentation, and more.What’s
WEBCAST: GETTING STARTED IN CYBER DECEPTION In this BHIS webcast, we will cover some basic, legal, and easy tools/techniques to get you started in working with low interaction honeypots to serve as an early warning of attacks. We will also be sharing a recipe for making wine out of pentester tears. Because attacker tears make the best wine. HOW TO CRACK PASSWORDS FOR PASSWORD PROTECTED MS OFFICE So now you should be set with the three files you need, all in one location: the MS Office file you want to crack the password for (crackme.xlsx), the decryption tool (msoffice-crypte.exe), and a text file full of password guesses (rockyou.txt). Open a cmd.exe window and change directories to the location where the three files are located(C
GETTING STARTED WITH APPLOCKER John Strand // I have quite a few calls with customers who do not know where to begin when it comes to application whitelisting. Often, the approach some organizations take is to try and implement full application whitelisting on every single application across their entire environment. While this goal is fun and seems like a DUMPING FIRMWARE WITH THE CH341A PROGRAMMER Rick Wisser // Note: This blog will also be a lab for any of the upcoming Wild West Hackin’ Fest Conferences. During a recent engagement, I came across an issue. The issue I encountered was that the SPI chip I was trying to dump the firmware off of was a 1.8v chip.This would not
Upcoming BHIS Webcast - Implementing Sysmon and AppLocker - Thurs, Aug 15, 2019 - 2:00 PM EST at: Register Now! Penetration testing for Fortune 50 companies since 2008.* About Us
* Testers
* Admin
* Bounty Hunters
* Interns
* Contact
* Contact Us
* Email Sign-Up
* Services
* All Services
* Red Teaming
* PCI QSA
* Projects/Tools
* All Tools
* RITA
* Other Fun Stuff
* Blog
* Webcasts
* Podcasts
* Events
* All Events
* Wild West Hackin’ Fest RESEARCH & TRAINING ARE IMPORTANT TO US IN ADDITION TO PENTESTS, WE DEDICATE A LARGE AMOUNT OF TIME CONTRIBUTING TO THE KNOWLEDGE OF THE ENTIRE SECURITY COMMUNITY. JOIN US LIVE FOR OUR WEBCASTS OR LISTEN TO OUR PODCAST VERSION WHEN IT’S CONVENIENT FOR YOU! WE COVER A WIDE RANGE OF TOPICS/SKILL LEVELS! NOT SURE WHERE TO START? OUR BLOG IS A TROVE OF INFORMATION THAT WILL GET YOU GOING IN THE RIGHT DIRECTION AND DON’T FORGET TO CHECK OUT OUR TOOLS ASWELL!
WHAT PEOPLE ARE SAYING ABOUT US ORGANIZATION & DETAILS “We’ve reviewed your final report, shared it among our group and have translated your recommendations into tasks that we will be following through on in the coming weeks. We appreciate the organization and details included in the report. It makes for a good at a glance assessment of the situation for people who don’t want to dig into the details.” — Mark KrenzLead Security Analyst, Center for Applied Cybersecurity Research - Indiana University MORE THAN COMPLIANCE “ was a hit with my team in . got us to start digging a little deeper and folks are starting to ask the harder questions. Not so much about, ‘Are we compliant?’ but more, ‘How do we detect and prevent lateral movement on our network?’ Fightingthe fight, bro!”
— Fred M.
ALREADY RECOMMENDED BHIS “We were very happy with the work you put in and have already recommended BHIS to a few other companies.”— Justin B.
Black Hills Information Security 115 W. Hudson St. Spearfish, SD 57783 | 701-484-BHIS2018
LINKS
* __
* __
* __
* __
* __
* __
SEARCH THE SITE __
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0