News
Signed, Trusted, and Abused: Proxy Execution via Web View2 - Black Hills Information Security, Inc.
9+ hour, 18+ min ago (463+ words) C2, How-To, Matthew Eidelberg, Red Team DLL sideloading, initial access In Proxying Your Way to Code Execution " A Different Take on DLL Hijacking I talk about how these applications "do not have any third-party or external addons that reside in user-controlled…...
Getting Started In Pentesting - Advice From The BHIS Pentest Lead - Black Hills Information Security, Inc.
1+ week, 9+ hour ago (1181+ words) Informational, Info Sec 101, Red Team career advice, getting started, Pentesting, Red Team After Wild West Hackin" Fest 2026 in Denver, I ran into Corey Ham, head of the ANTISOC Team (continuous pentesting) at BHIS, in the lobby of the hotel. He…...
The "P" in PAM is for Persistence: Linux Persistence Technique - Black Hills Information Security, Inc.
1+ mon, 1+ week ago (156+ words) Ben Bowman, Linux, Red Team, Red Team Tools Ben Bowman is a Security Analyst at Black Hills Information Security. He graduated in 2024 with a degree in cyber operations. Ben conducts research as well as tool development outside of testing. I…...
Malware Analysis: How to Analyze and Understand Malware - Black Hills Information Security, Inc.
1+ mon, 2+ week ago (666+ words) Informational, Info Sec 101 Green Book, Infosec for Beginners, Info Sec Survival Guide, John Hammond, Malware, Malware Analysis written by John Hammond || Guest Author This article was originally published in the Info Sec Survival Guide: Green Book. Find it free online…...