BHIS | Talkin’ Bout Infosec News
Join the BHIS team as we talk about current infosec news. Streamed live every Monday @ 4:30 pm. https://www.youtube.com/BlackHillsInformationSecurity
Join the BHIS team as we talk about current infosec news. Streamed live every Monday @ 4:30 pm. https://www.youtube.com/BlackHillsInformationSecurity
To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement, the more time we need. Time is something we don’t have a lot of […]
Dive deep into cutting-edge techniques that bypass or neuter modern endpoint defenses. Learn how these solutions work in order to mitigate their utility and hide deep within code on the endpoint. The days of downloading that binary from GitHub and pointing it at a box are over. Today’s defenses oftentimes call for multiple bypasses within […]
The Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different aspects can be exploited when performing penetration tests. The goal is not only to cover different attacks but also explain the details of why they work and how an environment can be […]
AASLR will have infosec professionals sharing their knowledge on tools, techniques, and procedures and then answering a lot of your questions on everything you can think to ask. Streamed live every Tuesday and Wednesday @ 4:30 pm. https://www.twitch.tv/antisyphon
To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement, the more time we need. Time is something we don’t have a lot of […]
Dive deep into cutting-edge techniques that bypass or neuter modern endpoint defenses. Learn how these solutions work in order to mitigate their utility and hide deep within code on the endpoint. The days of downloading that binary from GitHub and pointing it at a box are over. Today’s defenses oftentimes call for multiple bypasses within […]
The Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different aspects can be exploited when performing penetration tests. The goal is not only to cover different attacks but also explain the details of why they work and how an environment can be […]
AASLR will have infosec professionals sharing their knowledge on tools, techniques, and procedures and then answering a lot of your questions on everything you can think to ask. Streamed live every Tuesday and Wednesday @ 4:30 pm. https://www.twitch.tv/antisyphon
To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement, the more time we need. Time is something we don’t have a lot of […]
Dive deep into cutting-edge techniques that bypass or neuter modern endpoint defenses. Learn how these solutions work in order to mitigate their utility and hide deep within code on the endpoint. The days of downloading that binary from GitHub and pointing it at a box are over. Today’s defenses oftentimes call for multiple bypasses within […]
Thursday, August 4, 2022 – 2 pm EST (UTC -4) Register: https://zoom.us/webinar/register/WN_F8ALJZgMQ8emb3usRD7U3A In this webcast, John will rant. Sorry. More specifically, he is going to talk about his worst customer experiences and how to avoid them. Yes, he will talk about lawyers. Yes, he will talk about scope creep. Yes, he will talk about how […]