Black Hills Information Security

Black Hills Information Security company information, Employees & Contact Information

We specialize in penetration testing, red teaming, threat hunting, Active SOC services, and educational webinars, workshops, and training. We take the knowledge we have and continue to learn through our engagements and share it with the overall information security community because we believe we're all better together. Also... the creators of the Backdoors & Breaches, incident response card game.
Looking for a particular Black Hills Information Security employee's phone or email?

Black Hills Information Security Questions

News

Model Context Protocol (MCP) - Black Hills Information Security, Inc.

Model Context Protocol (MCP) Black Hills Information Security, Inc.

Offensive Tooling Cheatsheets: An Infosec Survival Guide Resource - Black Hills Information Security, Inc.

Offensive Tooling Cheatsheets: An Infosec Survival Guide Resource Black Hills Information Security, Inc.

Stop Spoofing Yourself! Disabling M365 Direct Send - Black Hills Information Security, Inc.

Stop Spoofing Yourself! Disabling M365 Direct Send Black Hills Information Security, Inc.

John Strand’s 5 Phase Plan For Starting in Computer Security - Black Hills Information Security, Inc.

John Strand’s 5 Phase Plan For Starting in Computer Security Black Hills Information Security, Inc.

Hunt for Weak Spots in Your Wireless Network with Airodump-ng from the Aircrack-ng Suite - Black Hills Information Security, Inc.

Hunt for Weak Spots in Your Wireless Network with Airodump-ng from the Aircrack-ng Suite Black Hills Information Security, Inc.

DomCat: A Domain Categorization Tool - Black Hills Information Security, Inc.

DomCat: A Domain Categorization Tool Black Hills Information Security, Inc.

Vulnerability Scanning with Nmap - Black Hills Information Security, Inc.

Vulnerability Scanning with Nmap Black Hills Information Security, Inc.

One Active Directory Account Can Be Your Best Early Warning - Black Hills Information Security, Inc.

One Active Directory Account Can Be Your Best Early Warning Black Hills Information Security, Inc.

How to Use Dirsearch - Black Hills Information Security, Inc.

How to Use Dirsearch Black Hills Information Security, Inc.

Getting Started with AI Hacking: Part 1 - Black Hills Information Security, Inc.

Getting Started with AI Hacking: Part 1 Black Hills Information Security, Inc.

Wi-Fi Forge: Practice Wi-Fi Security Without Hardware - Black Hills Information Security, Inc.

Wi-Fi Forge: Practice Wi-Fi Security Without Hardware Black Hills Information Security, Inc.

Avoiding Dirty RAGs: Retrieval-Augmented Generation with Ollama and LangChain - Black Hills Information Security, Inc.

Avoiding Dirty RAGs: Retrieval-Augmented Generation with Ollama and LangChain Black Hills Information Security, Inc.

Indecent Exposure: Your Secrets are Showing - Black Hills Information Security, Inc.

Indecent Exposure: Your Secrets are Showing Black Hills Information Security, Inc.

Pitting AI Against AI: Using PyRIT to Assess Large Language Models (LLMs) - Black Hills Information Security, Inc.

Pitting AI Against AI: Using PyRIT to Assess Large Language Models (LLMs) Black Hills Information Security, Inc.

Introduction to Zeek Log Analysis - Black Hills Information Security, Inc.

Introduction to Zeek Log Analysis Black Hills Information Security, Inc.

Finding Access Control Vulnerabilities with Autorize - Black Hills Information Security, Inc.

Finding Access Control Vulnerabilities with Autorize Black Hills Information Security, Inc.

Adversary in the Middle (AitM): Post-Exploitation - Black Hills Information Security, Inc.

Adversary in the Middle (AitM): Post-Exploitation Black Hills Information Security, Inc.

Dynamic Device Code Phishing - Black Hills Information Security, Inc.

Dynamic Device Code Phishing Black Hills Information Security, Inc.

Introducing GraphRunner: A Post-Exploitation Toolset for Microsoft 365 - Black Hills Information Security, Inc.

Introducing GraphRunner: A Post-Exploitation Toolset for Microsoft 365 Black Hills Information Security, Inc.

Rogue RDP – Revisiting Initial Access Methods - Black Hills Information Security, Inc.

Rogue RDP – Revisiting Initial Access Methods Black Hills Information Security, Inc.

WEBCAST: Your 5 Year Plan into InfoSec - Black Hills Information Security, Inc.

WEBCAST: Your 5 Year Plan into InfoSec Black Hills Information Security, Inc.

Abusing Active Directory Certificate Services (Part 1) - Black Hills Information Security, Inc.

Abusing Active Directory Certificate Services (Part 1) Black Hills Information Security, Inc.

Pentesting, Threat Hunting, and SOC: An Overview - Black Hills Information Security, Inc.

Pentesting, Threat Hunting, and SOC: An Overview Black Hills Information Security, Inc.

Spamming Microsoft 365 Like It’s 1995 - Black Hills Information Security, Inc.

Spamming Microsoft 365 Like It’s 1995 Black Hills Information Security, Inc.

Detecting Malware Beacons With Zeek and RITA - Black Hills Information Security, Inc.

Detecting Malware Beacons With Zeek and RITA Black Hills Information Security, Inc.

How To Disable LLMNR & Why You Want To - Black Hills Information Security, Inc.

How To Disable LLMNR & Why You Want To Black Hills Information Security, Inc.

Spoofing Microsoft 365 Like It’s 1995 - Black Hills Information Security, Inc.

Spoofing Microsoft 365 Like It’s 1995 Black Hills Information Security, Inc.

Proxying Your Way to Code Execution – A Different Take on DLL Hijacking - Black Hills Information Security, Inc.

Proxying Your Way to Code Execution – A Different Take on DLL Hijacking Black Hills Information Security, Inc.

How to Get a Job in Cybersecurity - Black Hills Information Security, Inc.

How to Get a Job in Cybersecurity Black Hills Information Security, Inc.

Machine-in-the-Middle (MitM) BLE Attack - Black Hills Information Security, Inc.

Machine-in-the-Middle (MitM) BLE Attack Black Hills Information Security, Inc.

The DNS over HTTPS (DoH) Mess - Black Hills Information Security, Inc.

The DNS over HTTPS (DoH) Mess Black Hills Information Security, Inc.

Red Teaming: A Story From the Trenches - Black Hills Information Security, Inc.

Red Teaming: A Story From the Trenches Black Hills Information Security, Inc.

From High School to Cyber Ninja—For Free (Almost)! - Black Hills Information Security, Inc.

From High School to Cyber Ninja—For Free (Almost)! Black Hills Information Security, Inc.

Is This Thing On? - Black Hills Information Security, Inc.

Is This Thing On? Black Hills Information Security, Inc.

Hunting for SSRF Bugs in PDF Generators - Black Hills Information Security, Inc.

Hunting for SSRF Bugs in PDF Generators Black Hills Information Security, Inc.

Rainy Day Windows Command Research Results - Black Hills Information Security, Inc.

Rainy Day Windows Command Research Results Black Hills Information Security, Inc.

Offensive IoT for Red Team Implants – Part 1 - Black Hills Information Security, Inc.

Offensive IoT for Red Team Implants – Part 1 Black Hills Information Security, Inc.

Your Password Is… wait for it… NOT Always Encrypted - Black Hills Information Security, Inc.

Your Password Is… wait for it… NOT Always Encrypted Black Hills Information Security, Inc.

Initial Access Operations Part 2: Offensive DevOps - Black Hills Information Security, Inc.

Initial Access Operations Part 2: Offensive DevOps Black Hills Information Security, Inc.

Cyber Range Updates - Black Hills Information Security, Inc.

Cyber Range Updates Black Hills Information Security, Inc.

Pushing Your Way In - Black Hills Information Security, Inc.

Pushing Your Way In Black Hills Information Security, Inc.

Cyber Range - Black Hills Information Security, Inc.

Cyber Range Black Hills Information Security, Inc.

DLL Jmping: Old Hollow Trampolines in Windows DLL Land - Black Hills Information Security, Inc.

DLL Jmping: Old Hollow Trampolines in Windows DLL Land Black Hills Information Security, Inc.

Revisiting Insecure Direct Object Reference (IDOR) - Black Hills Information Security, Inc.

Revisiting Insecure Direct Object Reference (IDOR) Black Hills Information Security, Inc.

Can’t Stop, Won’t Stop Hijacking (CSWSH) WebSockets - Black Hills Information Security, Inc.

Can’t Stop, Won’t Stop Hijacking (CSWSH) WebSockets Black Hills Information Security, Inc.

Gowitness, a Tester’s Time Saver - Black Hills Information Security, Inc.

Gowitness, a Tester’s Time Saver Black Hills Information Security, Inc.

How to Bypass Anti-Virus to Run Mimikatz - Black Hills Information Security, Inc.

How to Bypass Anti-Virus to Run Mimikatz Black Hills Information Security, Inc.

Monitoring High Risk Azure Logins - Black Hills Information Security, Inc.

Monitoring High Risk Azure Logins Black Hills Information Security, Inc.

A Sysmon Event ID Breakdown – Updated to Include 29!! - Black Hills Information Security, Inc.

A Sysmon Event ID Breakdown – Updated to Include 29!! Black Hills Information Security, Inc.

Evasive File Smuggling with Skyhook - Black Hills Information Security, Inc.

Evasive File Smuggling with Skyhook Black Hills Information Security, Inc.

Exploiting MFA Inconsistencies on Microsoft Services - Black Hills Information Security, Inc.

Exploiting MFA Inconsistencies on Microsoft Services Black Hills Information Security, Inc.

Your Browser is Not a Safe Space - Black Hills Information Security, Inc.

Your Browser is Not a Safe Space Black Hills Information Security, Inc.

My First Joyride With SILENTTRINITY - Black Hills Information Security, Inc.

My First Joyride With SILENTTRINITY Black Hills Information Security, Inc.

Weaponizing Princess Toys: Crafting Wi-Fi Attack Kits - Black Hills Information Security, Inc.

Weaponizing Princess Toys: Crafting Wi-Fi Attack Kits Black Hills Information Security, Inc.

A Toast to Kerberoast - Black Hills Information Security, Inc.

A Toast to Kerberoast Black Hills Information Security, Inc.

Active Directory Best Practices to Frustrate Attackers: Webcast & Write-up - Black Hills Information Security, Inc.

Active Directory Best Practices to Frustrate Attackers: Webcast & Write-up Black Hills Information Security, Inc.

Introducing Squeegee: The Microsoft Windows RDP Scraping Utility - Black Hills Information Security, Inc.

Introducing Squeegee: The Microsoft Windows RDP Scraping Utility Black Hills Information Security, Inc.

Fixing Content-Security-Policies with Cloudflare Workers - Black Hills Information Security, Inc.

Fixing Content-Security-Policies with Cloudflare Workers Black Hills Information Security, Inc.

How to Build Your Own Penetration Testing Drop Box - Black Hills Information Security, Inc.

How to Build Your Own Penetration Testing Drop Box Black Hills Information Security, Inc.

How to Crack Passwords in the Cloud with GPU Acceleration (Kali 2017) - Black Hills Information Security, Inc.

How to Crack Passwords in the Cloud with GPU Acceleration (Kali 2017) Black Hills Information Security, Inc.

Domain Goodness – How I Learned to LOVE AD Explorer - Black Hills Information Security, Inc.

Domain Goodness – How I Learned to LOVE AD Explorer Black Hills Information Security, Inc.

How SPF, DKIM, and DMARC Authentication Works to Increase Inbox Penetration (Testing) Rates - Black Hills Information Security, Inc.

How SPF, DKIM, and DMARC Authentication Works to Increase Inbox Penetration (Testing) Rates Black Hills Information Security, Inc.

Towards a Quieter Firefox - Black Hills Information Security, Inc.

Towards a Quieter Firefox Black Hills Information Security, Inc.

Introducing LoRa (Long Range) Wireless Technology – Part 1 - Black Hills Information Security, Inc.

Introducing LoRa (Long Range) Wireless Technology – Part 1 Black Hills Information Security, Inc.

RFID Proximity Cloning Attacks - Black Hills Information Security, Inc.

RFID Proximity Cloning Attacks Black Hills Information Security, Inc.

Having Fun with ActiveX Controls in Microsoft Word - Black Hills Information Security, Inc.

Having Fun with ActiveX Controls in Microsoft Word Black Hills Information Security, Inc.

Auditing GitLab: Public Gitlab Projects on Internal Networks - Black Hills Information Security, Inc.

Auditing GitLab: Public Gitlab Projects on Internal Networks Black Hills Information Security, Inc.

What’s Changed in Recon-ng 5.x - Black Hills Information Security, Inc.

What’s Changed in Recon-ng 5.x Black Hills Information Security, Inc.

An SMB Relay Race – How To Exploit LLMNR and SMB Message Signing for Fun and Profit - Black Hills Information Security, Inc.

An SMB Relay Race – How To Exploit LLMNR and SMB Message Signing for Fun and Profit Black Hills Information Security, Inc.

How to Weaponize the Yubikey - Black Hills Information Security, Inc.

How to Weaponize the Yubikey Black Hills Information Security, Inc.

Pentesting Dropbox on Steroids - Black Hills Information Security, Inc.

Pentesting Dropbox on Steroids Black Hills Information Security, Inc.

DNS Over HTTPS for Cobalt Strike - Black Hills Information Security, Inc.

DNS Over HTTPS for Cobalt Strike Black Hills Information Security, Inc.

Webcast: A Blue Team’s Perspective on Red Team Hack Tools - Black Hills Information Security, Inc.

Webcast: A Blue Team’s Perspective on Red Team Hack Tools Black Hills Information Security, Inc.

Start to Finish: Configuring an Android Phone for Pentesting - Black Hills Information Security, Inc.

Start to Finish: Configuring an Android Phone for Pentesting Black Hills Information Security, Inc.

A Pentester’s Voyage – The First Few Hours - Black Hills Information Security, Inc.

A Pentester’s Voyage – The First Few Hours Black Hills Information Security, Inc.

Cisco Smart Installs and Why They’re Not “Informational” - Black Hills Information Security, Inc.

Cisco Smart Installs and Why They’re Not “Informational” Black Hills Information Security, Inc.

Red + Blue = Purple - Black Hills Information Security, Inc.

Red + Blue = Purple Black Hills Information Security, Inc.

Satellite Hacking - Black Hills Information Security, Inc.

Satellite Hacking Black Hills Information Security, Inc.

Dumping Firmware With the CH341a Programmer - Black Hills Information Security, Inc.

Dumping Firmware With the CH341a Programmer Black Hills Information Security, Inc.

A Morning with Cobalt Strike & Symantec - Black Hills Information Security, Inc.

A Morning with Cobalt Strike & Symantec Black Hills Information Security, Inc.

How to Phish for Geniuses - Black Hills Information Security, Inc.

How to Phish for Geniuses Black Hills Information Security, Inc.

How to Identify Network Vulnerabilities with NetworkRecon.ps1 - Black Hills Information Security, Inc.

How to Identify Network Vulnerabilities with NetworkRecon.ps1 Black Hills Information Security, Inc.

Red Teaming Microsoft: Part 1 – Active Directory Leaks via Azure - Black Hills Information Security, Inc.

Red Teaming Microsoft: Part 1 – Active Directory Leaks via Azure Black Hills Information Security, Inc.

Bypassing Two-Factor Authentication on OWA & Office365 Portals - Black Hills Information Security, Inc.

Bypassing Two-Factor Authentication on OWA & Office365 Portals Black Hills Information Security, Inc.

Avoiding Memory Scanners - Black Hills Information Security, Inc.

Avoiding Memory Scanners Black Hills Information Security, Inc.

Rooting For Secrets with TruffleHog - Black Hills Information Security, Inc.

Rooting For Secrets with TruffleHog Black Hills Information Security, Inc.

Powershell Without Powershell - How To Bypass Application Whitelisting, Environment Restrictions & AV - Black Hills Information Security, Inc.

Powershell Without Powershell - How To Bypass Application Whitelisting, Environment Restrictions & AV Black Hills Information Security, Inc.

Webcast: In-Depth SILENTTRINITY Demo, Explanation & Walkthrough - Black Hills Information Security, Inc.

Webcast: In-Depth SILENTTRINITY Demo, Explanation & Walkthrough Black Hills Information Security, Inc.

How to Phish for User Passwords with PowerShell - Black Hills Information Security, Inc.

How to Phish for User Passwords with PowerShell Black Hills Information Security, Inc.

Azure Sentinel Quick-Deploy with Cyb3rWard0g’s Sentinel To-Go - Let’s Catch Cobalt Strike! - Black Hills Information Security, Inc.

Azure Sentinel Quick-Deploy with Cyb3rWard0g’s Sentinel To-Go - Let’s Catch Cobalt Strike! Black Hills Information Security, Inc.

Using CloudFront to Relay Cobalt Strike Traffic - Black Hills Information Security, Inc.

Using CloudFront to Relay Cobalt Strike Traffic Black Hills Information Security, Inc.

Bypassing Cylance: Part 1 – Using VSAgent.exe - Black Hills Information Security, Inc.

Bypassing Cylance: Part 1 – Using VSAgent.exe Black Hills Information Security, Inc.

Using Simple Burp Macros to Automate Testing - Black Hills Information Security, Inc.

Using Simple Burp Macros to Automate Testing Black Hills Information Security, Inc.

Google Calendar Event Injection with MailSniper - Black Hills Information Security, Inc.

Google Calendar Event Injection with MailSniper Black Hills Information Security, Inc.

Adding Egress Brute Force to PowerShell Payloads - Black Hills Information Security, Inc.

Adding Egress Brute Force to PowerShell Payloads Black Hills Information Security, Inc.

Crafting the Perfect Prompt: Getting the Most Out of ChatGPT and Other LLMs - Black Hills Information Security, Inc.

Crafting the Perfect Prompt: Getting the Most Out of ChatGPT and Other LLMs Black Hills Information Security, Inc.

Password Spraying Outlook Web Access - How to Gain Access to Domain Credentials Without Being on a Target's Network: Part 2 - Black Hills Information Security, Inc.

Password Spraying Outlook Web Access - How to Gain Access to Domain Credentials Without Being on a Target's Network: Part 2 Black Hills Information Security, Inc.

Understanding Zigbee and Wireless Mesh Networking - Black Hills Information Security, Inc.

Understanding Zigbee and Wireless Mesh Networking Black Hills Information Security, Inc.

HostRecon: A Situational Awareness Tool - Black Hills Information Security, Inc.

HostRecon: A Situational Awareness Tool Black Hills Information Security, Inc.

Lessons Learned While Pentesting GraphQL - Black Hills Information Security, Inc.

Lessons Learned While Pentesting GraphQL Black Hills Information Security, Inc.

Top Black Hills Information Security Employees

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant