News

Inc.
blackhillsinfosec. com > proxy-execution-via-webview2

Signed, Trusted, and Abused: Proxy Execution via Web View2 - Black Hills Information Security, Inc.

9+ hour, 18+ min ago  (463+ words) C2, How-To, Matthew Eidelberg, Red Team DLL sideloading, initial access In Proxying Your Way to Code Execution " A Different Take on DLL Hijacking I talk about how these applications "do not have any third-party or external addons that reside in user-controlled…...

Inc.
blackhillsinfosec. com > getting-started-in-pentesting

Getting Started In Pentesting - Advice From The BHIS Pentest Lead - Black Hills Information Security, Inc.

1+ week, 9+ hour ago  (1181+ words) Informational, Info Sec 101, Red Team career advice, getting started, Pentesting, Red Team After Wild West Hackin" Fest 2026 in Denver, I ran into Corey Ham, head of the ANTISOC Team (continuous pentesting) at BHIS, in the lobby of the hotel. He…...

Inc.
blackhillsinfosec. com > the-p-in-pam-is-for-persistence-linux-persistence-technique

The "P" in PAM is for Persistence: Linux Persistence Technique - Black Hills Information Security, Inc.

1+ mon, 1+ week ago  (156+ words) Ben Bowman, Linux, Red Team, Red Team Tools Ben Bowman is a Security Analyst at Black Hills Information Security. He graduated in 2024 with a degree in cyber operations. Ben conducts research as well as tool development outside of testing. I…...

Inc.
blackhillsinfosec. com > malware-analysis-how-to-analyze-and-understand-malware

Malware Analysis: How to Analyze and Understand Malware - Black Hills Information Security, Inc.

1+ mon, 2+ week ago  (666+ words) Informational, Info Sec 101 Green Book, Infosec for Beginners, Info Sec Survival Guide, John Hammond, Malware, Malware Analysis written by John Hammond || Guest Author This article was originally published in the Info Sec Survival Guide: Green Book. Find it free online…...