Black Hills Information Security(@BHinfoSecurity) 's Twitter Profileg
Black Hills Information Security

@BHinfoSecurity

Specializing in pen testing, red teaming, and Active SOC. We share our knowledge through blogs, webcasts, open-source tools, and Backdoors & Breaches game.

ID:1467505098

linkhttp://www.blackhillsinfosec.com calendar_today29-05-2013 15:17:42

11,4K Tweets

46,1K Followers

2,5K Following

Follow People
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

Day 106 of 366 Days of Cyber!

Get ready for a fair! ...That happened 47 years ago.

If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…

Day 106 of 366 Days of Cyber! Get ready for a fair! ...That happened 47 years ago. If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…
account_circle
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

Pre-orders for our new comic book series -- THE FUTURE IS ****** -- has exceeded $50,000 and almost has 300 backers.

If you'd like to get your pre-order in before the May 4th deadline -- kickstarter.com/projects/rekca…

You can select Tier 1 and choose the add-on items you want.

account_circle
Steve Borosh(@rvrsh3ll) 's Twitter Profile Photo

Finished out HackSpaceCon with Black Hills Information Security K presenting our 'Offensive Operations Against Foreign Adversaries: Russia' edition to a full room was awesome! New tool drop, blog to follow. 'взломать планету' github.com/ooafa.

account_circle
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

John Strand has some wise words for us today: youtube.com/watch?utm_camp…

If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…

John Strand has some wise words for us today: youtube.com/watch?utm_camp… If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…
account_circle
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

Day 104 of 366 Days of Cyber

Fun fact of the day!

If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…

Day 104 of 366 Days of Cyber Fun fact of the day! If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…
account_circle
LocalAreaKnitwork 🧶(@KillrBunn3) 's Twitter Profile Photo

Links you should know: The folks at Black Hills Information Security have the world's greatest Discord if you're into security. They have great talks and resources for the new folk and old guard alike.

discord.gg/zmhepCM2

account_circle
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

Day of 103 of 366 Days of Cyber!

Can you solve this puzzle?

If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…

Day of 103 of 366 Days of Cyber! Can you solve this puzzle? If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…
account_circle
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

**NEW** BHIS | Blog
Are you tired of the same old wireless testing methodology? If so, check out this one trick guaranteed to hook wireless clients!

How to Install and Perform Wi-Fi Attacks with Wifiphisher
by: Jordan Drysdale
Published: 4/11/2024
blackhillsinfosec.com/how-to-install…

account_circle
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

Day 102 of 366 Days of Cyber!

Today, we will be talking about SMUDGE - a tool for Passer.

Download & learn more about SMUDGE here: activecountermeasures.com/free-tools/smu…

If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume --…

Day 102 of 366 Days of Cyber! Today, we will be talking about SMUDGE - a tool for Passer. Download & learn more about SMUDGE here: activecountermeasures.com/free-tools/smu… If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume --…
account_circle
Wild West Hackin' Fest(@WWHackinFest) 's Twitter Profile Photo

WadingThruLogs is aboard his spaceship and ready to explore the galaxies at WWHF - Deadwood 2024! Please welcome Wade as one of our Keynote Speakers! wildwesthackinfest.com

@WadingThruLogs is aboard his spaceship and ready to explore the galaxies at WWHF - Deadwood 2024! Please welcome Wade as one of our Keynote Speakers! wildwesthackinfest.com #WWHF #Deadwood2024 #WeAimToMisbehave
account_circle
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

Day 101 of 366 Days of Cyber

The product of our love, knowledge, and more love for the cybersecurity community, Backdoors & Breaches, an Incident Response Card Game can teach you a lot! Watch our video to learn how to use it for education and training: youtu.be/pMY2HXUrKsg…

Day 101 of 366 Days of Cyber The product of our love, knowledge, and more love for the cybersecurity community, Backdoors & Breaches, an Incident Response Card Game can teach you a lot! Watch our video to learn how to use it for education and training: youtu.be/pMY2HXUrKsg…
account_circle
Red Siege Information Security(@RedSiege) 's Twitter Profile Photo

GroundBreaking and Exciting new things coming from our friends at Black Hills Information Security

Support for things like this is appreciated and elevates the space, the value, the education and the entertainment for everyone!

account_circle
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

'....IDOR is when an authenticated user of a web application is able to gain unauthorized access to resources by changing the value of an identifier in an HTTP request.'
Read more: blackhillsinfosec.com/revisiting-ins…

Revisiting Insecure Direct Object Reference (IDOR)
Published: 2/8/2024

account_circle
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

Hey folks!

Since the dawn of humanity, there has been phishing.

Join us for a free one-hour Black Hills Information Security (BHIS) webcast by Joseph (Security Analyst) about different tactics used over the years and how phishing has evolved from the perspective of a red…

Hey folks! Since the dawn of humanity, there has been phishing. Join us for a free one-hour Black Hills Information Security (BHIS) webcast by Joseph (Security Analyst) about different tactics used over the years and how phishing has evolved from the perspective of a red…
account_circle
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

Day 100 of 366 Days of Cyber!

XML External Entity may have some fun secrets… Learn more about them in our blog: blackhillsinfosec.com/xml-external-e…

If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…

Day 100 of 366 Days of Cyber! XML External Entity may have some fun secrets… Learn more about them in our blog: blackhillsinfosec.com/xml-external-e… If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…
account_circle
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

Day 99 of 366 Days of Cyber

Did you know?

If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…

Day 99 of 366 Days of Cyber Did you know? If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…
account_circle
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

Day 98 of 366 Days of Cyber!

Play Backdoors and Breaches for free online at play.backdoorsandbreaches.com/?utm_campaign=…

If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…

Day 98 of 366 Days of Cyber! Play Backdoors and Breaches for free online at play.backdoorsandbreaches.com/?utm_campaign=… If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…
account_circle
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

Day 97 of 366 Days of Cyber!

Weird code… Anyone know what it means?

If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…

Day 97 of 366 Days of Cyber! Weird code… Anyone know what it means? If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…
account_circle