**NEW** BHIS | Blog "Resource-based constrained delegation (RBCD) is similar to constrained delegation, but the resource itself controls which accounts can delegate to it." Abusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation by: Hunter Wade Published: 11/26/2025 Learn more: https://lnkd.in/ejeUiVJ5
Black Hills Information Security
Computer and Network Security
Spearfish, SD 126,264 followers
Follow our page for blogs, zines, slide decks, webcasts, and livestreams about information security and more!
About us
We specialize in penetration testing, red teaming, threat hunting, Active SOC services, and educational webinars, workshops, and training. We take the knowledge we have and continue to learn through our engagements and share it with the overall information security community because we believe we're all better together. Also... the creators of the Backdoors & Breaches, incident response card game.
- Website
-
https://www.blackhillsinfosec.com
External link for Black Hills Information Security
- Industry
- Computer and Network Security
- Company size
- 51-200 employees
- Headquarters
- Spearfish, SD
- Type
- Privately Held
- Founded
- 2008
- Specialties
- Post-Exploitation, Phishing Assessment & Compromised Email Check, Incident Response, Penetration Testing, Active Defenses Implementation, Security Team Training, Vulnerability Discovery, and Security Assessments
Locations
-
Primary
Get directions
115 W Hudson St
Spearfish, SD 57783, US
Employees at Black Hills Information Security
Updates
-
"DomCat is a command-line tool written in Golang that helps the user find expired domains with desirable categorizations." Read more: https://lnkd.in/e67mRqHz DomCat: A Domain Categorization Tool by: William Oldert Published: 9/24/2025
-
-
Security teams can have bad habits. ANTISOC uses a mix of techniques from traditional pentesting to social engineering to discover those habits. Corey Ham walks us through an example of BHIS ANTISOC team can discover the bad habits within your security team. Read the full Antisoc issue here -- https://lnkd.in/em7hYix More From Corey Ham: Discovering and Exploiting N-Days - https://lnkd.in/eQC6cctZ Know the Unknowns: Exploring Breaches - https://lnkd.in/efjcchEf Hacking Failures - https://lnkd.in/eNemt7Mf
-
-
Join us for this week's infosec-news stories with the Black Hills Infosec team live at 4:30pm ET on Mondays -- https://lnkd.in/e8VzKnUB
-
-
Last week John Strand joins us to give us a history lesson on China! This week lets up the John Strand time with one of his infamous rants! Did PCI 4.0 change your life? Did it change much? Watch the full webcast here -- https://lnkd.in/e67BvjVZ
-
If there's one tool we won't stop talking about it's Wireshark by the Wireshark Foundation. Seriously it's an awesome tool and great way to read and analyze network traffic. That's why Shad B. collaborated us to provide you a cheat sheet for all of your Wireshark needs! Checkout the cheat sheet below and download Wireshark here --https://www.wireshark.org/
-
**NEW** BHIS | Blog Have you ever read the Verizon Data Breach summary? Us neither, but we think it looks like a lot like the data here. Why You Got Hacked - 2025 Super Edition by: Jordan Drysdale Published: 11/19/2025 Learn more: https://lnkd.in/e4KSp8qq
-
-
Antisyphon Training is Powered by BHIS! Antisyphon Infosec Training is here to disrupt the traditional training industry by providing high-quality and cutting-edge education to everyone, regardless of their financial position. They offer: - Live Training - On-Demand Training - Weekly Anticast available live on YouTube at https://lnkd.in/eRt9Ug3Z - Pay-Forward-You-Can Classes & Workshops - Free Summits - And more! Keep up with all things Antisyphon Training at https://lnkd.in/gVSZBhsh LINKEDIN_COMPANY
-
-
"When performing Windows endpoint investigations, with a typical average of 200K-500K event log entries per host, we can use Hayabusa to reduce and prioritize our event analysis." Read more: https://lnkd.in/eEbiYmvK Wrangling Windows Event Logs with Hayabusa and SOF-ELK (Part 1) by: Patterson Cake Published: 9/17/2025
-
-
Hey Folks! Lets take a look at what's happening over the next few weeks! Anti-Cast The next free one-hour Antisyphon Training Anticast is on How You Got Hacked – 2025 Data Deep Dive with Jordan & Kent, Wed, Nov 19, 2025 12:00 PM EST. Register (Zoom): https://lnkd.in/e5ucPxuj Curious how real breaches happen? Join Black Hills Infosec (BHIS) pentesters Jordan Drysdale and Kent Ickler for a free one-hour training session as they unpack a year’s worth of penetration testing data: over 850 tests and more than 6,000 vulnerabilities. See exactly how attackers got in, which mistakes were most common, and the practical steps you can take to avoid being next. Get ready for a fast-paced, fact-driven webcast packed with actionable insights Workshops: This Week: Nov. 20th: An Introduction to Cryptography with Doc Blackburn https://lnkd.in/gAXk_hfa Nov. 21st: AI Foundation: Cyber Security Workflow Optimization using AI Technology with Joff Thyer and Derek Banks https://lnkd.in/gguu7Bya Two weeks out! Pay-Forward-What-You-Can Training: Dec. 2nd: Started in Security with BHIS and MITRE ATT&CK with John Strand https://lnkd.in/eaeikyGi
-