Black Hills Information Security

By Black Hills Information Security

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store.


Category: Tech News

Open in iTunes


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 26
Reviews: 0

Description

Penetration testing for Fortune 50 companies since 2008.

Episode Date
Podcast: Attack Tactics 6! Return of the Blue Team
56:10
<p><img width="1280" height="720" src="https://www.blackhillsinfosec.com/wp-content/uploads/2019/05/00389_05302019_AttackTacts6.png" class="attachment-full size-full wp-post-image" alt="" srcset="https://www.blackhillsinfosec.com/wp-content/uploads/2019/05/00389_05302019_AttackTacts6.png 1280w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/05/00389_05302019_AttackTacts6-300x169.png 300w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/05/00389_05302019_AttackTacts6-768x432.png 768w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/05/00389_05302019_AttackTacts6-1024x576.png 1024w" sizes="(max-width: 1280px) 100vw, 1280px" /></p> <p>Download slides: https://www.activecountermeasures.com/presentations In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5!!! Originally recorded as a live webcast on May 16th, 2019Presented by: John Strand, Jordan Drysdale, Kent Ickler Join the BHIS Blog Mailing List – get notified when […]</p> <p>The post <a rel="nofollow" href="https://www.blackhillsinfosec.com/podcast-attack-tactics-6-return-of-the-blue-team/">Podcast: Attack Tactics 6! Return of the Blue Team</a> appeared first on <a rel="nofollow" href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
May 30, 2019
Podcast: Weaponizing Corporate Intel. This Time, It’s Personal!
56:34
<p><img width="1280" height="720" src="https://www.blackhillsinfosec.com/wp-content/uploads/2019/05/00387_05112019_PODCAST_Weaponizing_Intel.png" class="attachment-full size-full wp-post-image" alt="" srcset="https://www.blackhillsinfosec.com/wp-content/uploads/2019/05/00387_05112019_PODCAST_Weaponizing_Intel.png 1280w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/05/00387_05112019_PODCAST_Weaponizing_Intel-300x169.png 300w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/05/00387_05112019_PODCAST_Weaponizing_Intel-768x432.png 768w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/05/00387_05112019_PODCAST_Weaponizing_Intel-1024x576.png 1024w" sizes="(max-width: 1280px) 100vw, 1280px" /></p> <p>Beau Bullock & Mike Felch// Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester performs up front. Often times testers only resort to using publicly available tools which can overlook critical assets. Download slides: http://www.activecountermeasures.com/presentations/ In this one-hour BHIS podcast […]</p> <p>The post <a rel="nofollow" href="https://www.blackhillsinfosec.com/podcast-weaponizing-corporate-intel-this-time-its-personal/">Podcast: Weaponizing Corporate Intel. This Time, It’s Personal!</a> appeared first on <a rel="nofollow" href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
May 11, 2019
BHIS PODCAST: Tracking attackers. Why attribution matters and how to do it.
54:43
<p><img width="1280" height="720" src="https://www.blackhillsinfosec.com/wp-content/uploads/2019/03/00377_03182019_PODCAST_TrackingAttackers.png" class="attachment-full size-full wp-post-image" alt="" srcset="https://www.blackhillsinfosec.com/wp-content/uploads/2019/03/00377_03182019_PODCAST_TrackingAttackers.png 1280w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/03/00377_03182019_PODCAST_TrackingAttackers-300x169.png 300w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/03/00377_03182019_PODCAST_TrackingAttackers-768x432.png 768w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/03/00377_03182019_PODCAST_TrackingAttackers-1024x576.png 1024w" sizes="(max-width: 1280px) 100vw, 1280px" /></p> <p>In this BHIS podcast, originally recorded as a live webcast, we cover some new techniques and tactics on how to track attackers via various honey tokens.  We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst.  We also cover some of the legal ramifications involved in doing […]</p> <p>The post <a rel="nofollow" href="https://www.blackhillsinfosec.com/bhis-podcast-tracking-attackers-why-attribution-matters-and-how-to-do-it/">BHIS PODCAST: Tracking attackers. Why attribution matters and how to do it.</a> appeared first on <a rel="nofollow" href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
Mar 18, 2019
BHIS PODCAST: Endpoint Security Got You Down? No PowerShell? No Problem.
54:28
<p><img width="1280" height="720" src="https://www.blackhillsinfosec.com/wp-content/uploads/2019/03/00375_03062019_PODCAST_EndpointSecurityGotYouDown.png" class="attachment-full size-full wp-post-image" alt="" srcset="https://www.blackhillsinfosec.com/wp-content/uploads/2019/03/00375_03062019_PODCAST_EndpointSecurityGotYouDown.png 1280w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/03/00375_03062019_PODCAST_EndpointSecurityGotYouDown-300x169.png 300w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/03/00375_03062019_PODCAST_EndpointSecurityGotYouDown-768x432.png 768w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/03/00375_03062019_PODCAST_EndpointSecurityGotYouDown-1024x576.png 1024w" sizes="(max-width: 1280px) 100vw, 1280px" /></p> <p>Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs & Windows Defender every time you need to pop a box?  In this one-hour podcast, originally recorded as a live webcast, we introduce a somewhat new Red Team approach that we call BYOI (Bring Your Own Interpreter). Download slides: https://www.activecountermeasures.com/presentations/ Turns out, by […]</p> <p>The post <a rel="nofollow" href="https://www.blackhillsinfosec.com/bhis-podcast-endpoint-security-got-you-down-no-powershell-no-problem/">BHIS PODCAST: Endpoint Security Got You Down? No PowerShell? No Problem.</a> appeared first on <a rel="nofollow" href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
Mar 06, 2019
BHIS Podcast: Blockchain and You! InfoSec Edition
57:10
<p><img width="1280" height="720" src="https://www.blackhillsinfosec.com/wp-content/uploads/2019/02/00373_02272019_PODCAST_BlockchainAndYou.png" class="attachment-full size-full wp-post-image" alt="" srcset="https://www.blackhillsinfosec.com/wp-content/uploads/2019/02/00373_02272019_PODCAST_BlockchainAndYou.png 1280w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/02/00373_02272019_PODCAST_BlockchainAndYou-300x169.png 300w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/02/00373_02272019_PODCAST_BlockchainAndYou-768x432.png 768w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/02/00373_02272019_PODCAST_BlockchainAndYou-1024x576.png 1024w" sizes="(max-width: 1280px) 100vw, 1280px" /></p> <p>Take a good look at Bitcoin right now… these are the unlucky ones. These are the unfortunate souls who jumped on another overinflated balloon. But, does this Bitcoin crash completely undermine all blockchain technologies? Since Bitcoin is crashing and burning we figured it would be a good time to have a webcast on blockchain security […]</p> <p>The post <a rel="nofollow" href="https://www.blackhillsinfosec.com/bhis-podcast-blockchain-and-you-infosec-edition/">BHIS Podcast: Blockchain and You! InfoSec Edition</a> appeared first on <a rel="nofollow" href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
Feb 27, 2019
PODCAST: Sacred Cash Cow Tipping 2019
46:03
<p><img width="1200" height="1200" src="https://www.blackhillsinfosec.com/wp-content/uploads/2019/01/Sacred-Cash-Cow-Tipping-2019-Podcast.jpg" class="attachment-full size-full wp-post-image" alt="" srcset="https://www.blackhillsinfosec.com/wp-content/uploads/2019/01/Sacred-Cash-Cow-Tipping-2019-Podcast.jpg 1200w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/01/Sacred-Cash-Cow-Tipping-2019-Podcast-150x150.jpg 150w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/01/Sacred-Cash-Cow-Tipping-2019-Podcast-300x300.jpg 300w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/01/Sacred-Cash-Cow-Tipping-2019-Podcast-768x768.jpg 768w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/01/Sacred-Cash-Cow-Tipping-2019-Podcast-1024x1024.jpg 1024w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/01/Sacred-Cash-Cow-Tipping-2019-Podcast-1024x1024-50x50.jpg 50w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/01/Sacred-Cash-Cow-Tipping-2019-Podcast-1024x1024-221x221.jpg 221w, https://www.blackhillsinfosec.com/wp-content/uploads/2019/01/Sacred-Cash-Cow-Tipping-2019-Podcast-1024x1024-978x978.jpg 978w" sizes="(max-width: 1200px) 100vw, 1200px" /></p> <p>Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, “Why do these endpoint security bypass techniques still work? Why?” The goal of this is to share just some of the ways Black Hills Information Security bypassed endpoint security in 2018. Unfortunately, these webcasts still seem to be needed because there […]</p> <p>The post <a rel="nofollow" href="https://www.blackhillsinfosec.com/podcast-sacred-cash-cow-tipping-2019/">PODCAST: Sacred Cash Cow Tipping 2019</a> appeared first on <a rel="nofollow" href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
Jan 15, 2019
PODCAST: RDP Logging Bypass and Azure Active Directory Recon
53:46
<p><img width="1200" height="1200" src="https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/beau-and-mike-RDP.jpg" class="attachment-full size-full wp-post-image" alt="" srcset="https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/beau-and-mike-RDP.jpg 1200w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/beau-and-mike-RDP-150x150.jpg 150w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/beau-and-mike-RDP-300x300.jpg 300w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/beau-and-mike-RDP-768x768.jpg 768w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/beau-and-mike-RDP-1024x1024.jpg 1024w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/beau-and-mike-RDP-1024x1024-50x50.jpg 50w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/beau-and-mike-RDP-1024x1024-221x221.jpg 221w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/beau-and-mike-RDP-1024x1024-978x978.jpg 978w" sizes="(max-width: 1200px) 100vw, 1200px" /></p> <p>For this podcast we cover a couple of different topics. First, we talk about how to password spray in a non-attributable sort of way. Beau found a way to obfuscate what RDP logs record with launching password spraying attacks. This has implications for UBEA. It is… kind of cool. Second, we cover how to do […]</p> <p>The post <a rel="nofollow" href="https://www.blackhillsinfosec.com/podcast-rdp-logging-bypass-and-azure-active-directory-recon/">PODCAST: RDP Logging Bypass and Azure Active Directory Recon</a> appeared first on <a rel="nofollow" href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
Dec 28, 2018
PODCAST: BHIS Sorta Top Used Tools of 2018
50:49
<p><img width="1200" height="1200" src="https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/tools-podcast.jpg" class="attachment-full size-full wp-post-image" alt="" srcset="https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/tools-podcast.jpg 1200w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/tools-podcast-150x150.jpg 150w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/tools-podcast-300x300.jpg 300w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/tools-podcast-768x768.jpg 768w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/tools-podcast-1024x1024.jpg 1024w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/tools-podcast-1024x1024-50x50.jpg 50w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/tools-podcast-1024x1024-978x978.jpg 978w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/tools-podcast-1024x1024-221x221.jpg 221w" sizes="(max-width: 1200px) 100vw, 1200px" /></p> <p>In this webcast we cover some of the core tools we use all the time at Black Hills Information Security. However, there’s a twist. We don’t talk about Nessus, Nmap, or Metasploit. Why? Because there are a ton of new (and older) tools we use that fall outside of the standard tools you see in […]</p> <p>The post <a rel="nofollow" href="https://www.blackhillsinfosec.com/podcast-bhis-sorta-top-used-tools-of-2018/">PODCAST: BHIS Sorta Top Used Tools of 2018</a> appeared first on <a rel="nofollow" href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
Dec 17, 2018
PODCAST: Raising Hacker Kids
46:17
<p><img width="1200" height="1200" src="https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/hacker-kids-podcast.jpg" class="attachment-full size-full wp-post-image" alt="" srcset="https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/hacker-kids-podcast.jpg 1200w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/hacker-kids-podcast-150x150.jpg 150w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/hacker-kids-podcast-300x300.jpg 300w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/hacker-kids-podcast-768x768.jpg 768w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/hacker-kids-podcast-1024x1024.jpg 1024w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/hacker-kids-podcast-1024x1024-50x50.jpg 50w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/hacker-kids-podcast-1024x1024-221x221.jpg 221w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/hacker-kids-podcast-1024x1024-978x978.jpg 978w" sizes="(max-width: 1200px) 100vw, 1200px" /></p> <p>Yes.. Ethical Hacker Kids. The holidays are coming up! Here John & Jordan cover the different games, tools and gifts we can give kids that help teach them the trade. There is nothing, nothing like sitting around with family picking locks, learning to code and helping kids through the latest Holiday Hack Challenge. And!! We […]</p> <p>The post <a rel="nofollow" href="https://www.blackhillsinfosec.com/podcast-raising-hacker-kids/">PODCAST: Raising Hacker Kids</a> appeared first on <a rel="nofollow" href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
Dec 04, 2018
PODCAST: Blue Team-Apalooza
48:33
<p><img width="1200" height="1200" src="https://www.blackhillsinfosec.com/wp-content/uploads/2018/11/blue-team-apalooza.jpg" class="attachment-full size-full wp-post-image" alt="" srcset="https://www.blackhillsinfosec.com/wp-content/uploads/2018/11/blue-team-apalooza.jpg 1200w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/11/blue-team-apalooza-150x150.jpg 150w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/11/blue-team-apalooza-300x300.jpg 300w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/11/blue-team-apalooza-768x768.jpg 768w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/11/blue-team-apalooza-1024x1024.jpg 1024w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/11/blue-team-apalooza-1024x1024-50x50.jpg 50w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/11/blue-team-apalooza-1024x1024-978x978.jpg 978w, https://www.blackhillsinfosec.com/wp-content/uploads/2018/11/blue-team-apalooza-1024x1024-221x221.jpg 221w" sizes="(max-width: 1200px) 100vw, 1200px" /></p> <p>Over the past few months, we have discovered a couple trends that organizations seem to be missing. No silver bullets, just some general vulnerability issues we are seeing again and again. In this podcast, Jordan & Kent give a few pointers and some new tools to help the blue team stay on top of these […]</p> <p>The post <a rel="nofollow" href="https://www.blackhillsinfosec.com/podcast-blue-team-apalooza/">PODCAST: Blue Team-Apalooza</a> appeared first on <a rel="nofollow" href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
Nov 15, 2018