Black Hills Information Security (@bhinfosecurity) 's Twitter Profile
Black Hills Information Security

@bhinfosecurity

Specializing in pen testing, red teaming, and Active SOC. We share our knowledge through blogs, webcasts, open-source tools, and Backdoors & Breaches game.

ID: 1467505098

linkhttp://www.blackhillsinfosec.com calendar_today29-05-2013 15:17:42

11,11K Tweet

47,47K Followers

2,2K Following

#BSidesNYC (@bsidesnyc) 's Twitter Profile Photo

Thank you Black Hills Information Security for your continuing support of #BSidesNYC with your donation of Backdoors & Breaches decks for this year's workshop led by Tom Goodheart on October 19 at BSidesNYC 0x04.

Thank you <a href="/BHinfoSecurity/">Black Hills Information Security</a> for your continuing support of <a href="/BSidesNYC/">#BSidesNYC</a> with your donation of Backdoors &amp; Breaches decks for this year's workshop led by Tom Goodheart on October 19 at BSidesNYC 0x04.
Antisyphon Training (@antisy_training) 's Twitter Profile Photo

Coming up this week at Antisyphon Training and Black Hills Information Security! Every week we bring guests to our webcasts to give back to the community through sharing their knowledge. If this is something you are interested in, drop a comment below! poweredbybhis.com/?utm_campaign=…

Coming up this week at Antisyphon Training and Black Hills Information Security!

Every week we bring guests to our webcasts to give back to the community through sharing their knowledge. If this is something you are interested in, drop a comment below!

poweredbybhis.com/?utm_campaign=…
Antisyphon Training (@antisy_training) 's Twitter Profile Photo

Don't miss out on our next CTF Competition this week with MetaCTF! This is a free competition, fun for all levels and everyone is welcome to join us. If you're ready for a challenge signup here: app.metactf.com/join/sep2024?u…

Don't miss out on our next CTF Competition this week with MetaCTF!

This is a free competition, fun for all levels and everyone is welcome to join us.

If you're ready for a challenge signup here: app.metactf.com/join/sep2024?u…
Antisyphon Training (@antisy_training) 's Twitter Profile Photo

Did you miss our Anti-Cast, Conquering Your CISSP with Jason Gillam from Secure Ideas? Well, our Anti-Dote is here to bring you the highlights! Check it out here: antisyphontraining.com/conquering-you…

Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

Day 261 of 366 Days of Cyber! A short BHIS nugget exploring TCPDump with John Strand -- youtu.be/hC3ANnUXn_o?ut… If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…

Day 261 of 366 Days of Cyber!

A short BHIS nugget exploring TCPDump with John Strand  -- youtu.be/hC3ANnUXn_o?ut…

If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

Hey folks! In today's cyber landscape, wireless vulnerabilities and attack paths can be complex.  It has become increasingly vital to understand what devices are connected to your wireless networks and how they alter your attack surface. In this free one-hour Black Hills

Hey folks!

In today's cyber landscape, wireless vulnerabilities and attack paths can be complex. 

It has become increasingly vital to understand what devices are connected to your wireless networks and how they alter your attack surface.

In this free one-hour Black Hills
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

"It is a common misconception that once an adversary has gained initial access to an organization's network, that it is already game over." Read more: blackhillsinfosec.com/auditing-gitla… Auditing GitLab: Public Gitlab Projects on Internal Networks by: Phil Miller Published: 7/18/2024

Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

Day 262 of 366 Days! Explore incident handling fundamentals, attacker methodologies, Zeek scripting, flow data analysis, & more --antisyphontraining.com/course/network… If you'd like more educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…

Day 262 of 366 Days!

Explore incident handling fundamentals, attacker methodologies, Zeek scripting, flow data analysis, &amp; more --antisyphontraining.com/course/network…

If you'd like more educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

" In this post, we are going to walk through setting up the Kismet tool and performing basic analysis of 802.11x traffic..." Read more: blackhillsinfosec.com/an-introductio… Ghost in the Wireless: An Introduction to Airspace Analysis with Kismet by: Cameron Cartier Published: 8/15/2024

Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

Day 263 of 366 Days of Cyber! Take a break and solve this puzzle! If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…

Day 263 of 366 Days of Cyber!

Take a break and solve this puzzle!

If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

It's REKCAH hoodie weather -- spearphish-general-store.myshopify.com/collections/bh… US shipping only for now, we're working on getting these printed in the EU.

It's REKCAH hoodie weather -- spearphish-general-store.myshopify.com/collections/bh…

US shipping only for now, we're working on getting these printed in the EU.
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

**NEW** BHIS | Blog Did you know that most systems are vulnerable to the shadow credentials attack? Enable Auditing of Changes to msDS-KeyCredentialLink by: jordan drysdale Published: 9/19/2024 Learn more: blackhillsinfosec.com/enable-auditin…

Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

Great to see more defensive advice. If you would like to have a look at the attack narrative of Shadow Credentials, I wrote an article 2 years ago pentestlab.blog/2022/02/07/sha…

Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

Day 264 of 366 Days of Cyber! We yearn to be a freebooter! The Future is ******! Read the preview for free at rekcahcomcis.com/?utm_campaign=… If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…

Day 264 of 366 Days of Cyber!

We yearn to be a freebooter! The Future is ******!

Read the preview for free at rekcahcomcis.com/?utm_campaign=…

If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

Day 265 of 366 days of Cyber! We are still warning about this. If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…

Day 265 of 366 days of Cyber!

We are still warning about this.

If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…
Bsides Orlando (@bsidesorl) 's Twitter Profile Photo

Shoutout to Black Hills Information Security for being our second longest-running sponsor, supporting us for 8 incredible years! Your dedication continues to drive innovation in the cybersecurity community. We're thrilled to have you with us again!

Shoutout to <a href="/BHinfoSecurity/">Black Hills Information Security</a> for being our second longest-running sponsor, supporting us for 8 incredible years! Your dedication continues to drive innovation in the cybersecurity community. We're thrilled to have you with us again!
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

Day 266 of 366 Days of Cyber! It took them TWO years to disclose the breach! If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…

Day 266 of 366 Days of Cyber!

It took them TWO years to disclose the breach!

If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

Day 267 of 366 days of Cyber! Explore PowerShell Logging for Blue Team with BHIS and Joff Thyer -- blackhillsinfosec.com/powershell-log… If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…

Day 267 of 366 days of Cyber!

Explore PowerShell Logging for Blue Team with BHIS and Joff Thyer -- blackhillsinfosec.com/powershell-log…

If you'd like more helpful educational content, check out the Infosec Survival Guide: Second Volume -- blackhillsinfosec.com/prompt-zine/pr…