Talkin' About [Infosec] News, Powered by Black Hills Information Security artwork

Talkin' About [Infosec] News, Powered by Black Hills Information Security

250 episodes - English - Latest episode: 16 days ago - ★★★★★ - 77 ratings

Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.

Tech News News Education
Homepage Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed

Episodes

Webcast: Infosec Mentoring | How to Find and Be a Mentor & Mentee

October 19, 2020 17:10 - 1 hour - 41.9 MB

They say it “takes a village” to help raise a child… well, it also takes a village to help raise an infosec professional. With so many technologies, techniques, and tools […] The post Webcast: Infosec Mentoring | How to Find and Be a Mentor & Mentee appeared first on Black Hills Information Security.

Webcast: When Worlds Collide: OSS Hunting & Adversarial Simulation

September 09, 2020 15:27 - 1 hour - 46.7 MB

Worlds collide as Black Hills Information Security (BHIS) brings together legendary developers in open source software (OSS) hunting and adversarial emulation projects for a discussion on the current state of […] The post Webcast: When Worlds Collide: OSS Hunting & Adversarial Simulation appeared first on Black Hills Information Security.

Webcast: How to Present: Secrets of a Retired SANS Instructor

September 04, 2020 12:10 - 1 hour - 49.1 MB

John Strand // Ok, that was a bit of a dramatic title. But, it works. In this Black Hills Information Security (BHIS) webcast, John covers the tips and tricks on […] The post Webcast: How to Present: Secrets of a Retired SANS Instructor appeared first on Black Hills Information Security.

Webcast: Pretty Little Python Secrets – Episode 1 – Installing Python Tools and Libraries the Right Way

August 24, 2020 12:14 - 1 hour - 38.1 MB

Have you ever installed a Python tool / library only to then find out other Python based tools you’ve installed previously are now completely broken? Running Kali? Ever try installing […] The post Webcast: Pretty Little Python Secrets – Episode 1 – Installing Python Tools and Libraries the Right Way appeared first on Black Hills Information Security.

Webcast: What to Expect When You’re Expecting a Penetration Test

August 21, 2020 14:17 - 1 hour - 41.5 MB

CJ and Bryan will share the knowledge they’ve accumulated, by helping 1,000’s of organizations determine what they need and don’t need when it comes to penetration tests and security assessments, […] The post Webcast: What to Expect When You’re Expecting a Penetration Test appeared first on Black Hills Information Security.

Webcast: Atomic Purple Team Framework and Life Cycle

July 30, 2020 12:03 - 59 minutes - 30.3 MB

Jordan Drysdale & Kent Ickler // Jordan and Kent are back again to continue strengthening organizations’ information security human capital (That’s all you folks!). Organization Leadership and Security Practitioners can […] The post Webcast: Atomic Purple Team Framework and Life Cycle appeared first on Black Hills Information Security.

Webcast: What About Ransomware?

July 13, 2020 18:57 - 1 hour - 42 MB

This is a joint webcast between Black Hills Information Security and the Wild West Hackin’ Fest conference. We hate ransomware. Like a lot. This is because we feel this is […] The post Webcast: What About Ransomware? appeared first on Black Hills Information Security.

Webcast: Modern Webapp Pentesting: How to Attack a JWT

June 29, 2020 12:05 - 55 minutes - 27.2 MB

So much information about testing webapps for security problems is old. Don’t get me wrong, the old stuff still works way more often than we’d like, but there’s more to […] The post Webcast: Modern Webapp Pentesting: How to Attack a JWT appeared first on Black Hills Information Security.

Webcast: IPv6: How to Securely Start Deploying

June 24, 2020 14:54 - 59 minutes - 30.9 MB

Joff Thyer has dove into everything that is IPv6 and has so much to share about it. He gets really technical but in a way you’ll be able to understand. […] The post Webcast: IPv6: How to Securely Start Deploying appeared first on Black Hills Information Security.

Webcast: Durable vs. Ephemeral Threat Intel

June 22, 2020 18:39 - 5 MB

In this Black Hills Information Security webcast John breakdowns why he hates threat intelligence… Again… But, he breaks down some of the cool new projects that are focusing on durable […] The post Webcast: Durable vs. Ephemeral Threat Intel appeared first on Black Hills Information Security.

Webcast: A Blue Team’s Perspective on Red Team Hack Tools

June 08, 2020 12:28 - 1 hour - 30.2 MB

Kent and Jordan are back to continue their journey to make the world a better place. This time around, they will be reviewing a series of tools commonly used on […] The post Webcast: A Blue Team’s Perspective on Red Team Hack Tools appeared first on Black Hills Information Security.

Webcast: How to Hunt for Jobs like a Hacker

June 03, 2020 12:11 - 1 hour - 44.7 MB

Job hunting? Looking for a career change? Still in college and want to know how to get started now in your career? If you answered yes to any of these […] The post Webcast: How to Hunt for Jobs like a Hacker appeared first on Black Hills Information Security.

Webcast: Kerberos & Attacks 101

May 26, 2020 14:02 - 1 hour - 31 MB

Join the BHIS Discord discussion server: https://discord.gg/aHHh3u5 We’re really excited to have a close member of our BHIS extended family, Tim Medin from Red Siege InfoSec, here for a webcast […] The post Webcast: Kerberos & Attacks 101 appeared first on Black Hills Information Security.

Webcast: Free Tools! How to Use Developer Tools and Javascript in Webapp Pentests

May 06, 2020 12:36 - 46 minutes - 22.4 MB

I like webapps, don’t you? Webapps have got to be the best way to learn about security. Why? Because they’re self-contained and so very transparent. You don’t need a big […] The post Webcast: Free Tools! How to Use Developer Tools and Javascript in Webapp Pentests appeared first on Black Hills Information Security.

Webcast: How to Build a Home Lab

April 27, 2020 13:35 - 1 hour - 37.6 MB

This is a joint webcast from Black Hills Information Security and Active Countermeasures. How many of us have tried some new configuration option, utility, or hardware on a production environment, […] The post Webcast: How to Build a Home Lab appeared first on Black Hills Information Security.

Webcast: Pandemic Paradigm Shift: Remote Working is the New Normal

April 01, 2020 12:12 - 58 minutes - 28.3 MB

What does it mean to work from home across your corporate VPN? What exactly is VPN? Is your home office prepared? How can you improve and better secure your home […] The post Webcast: Pandemic Paradigm Shift: Remote Working is the New Normal appeared first on Black Hills Information Security.

Webcast: How (we) Run a Virtual Conference and How You Can, Too

March 25, 2020 12:05 - 1 hour - 33.1 MB

The team at Black Hills Information Security and Wild West Hackin’ Fest had to pivot from doing an in-person information security conference in San Diego to a 100% virtual conference […] The post Webcast: How (we) Run a Virtual Conference and How You Can, Too appeared first on Black Hills Information Security.

Webcast: Think You’re Compromised? What Do We Do Next?

March 11, 2020 15:46 - 1 hour - 30.4 MB

In this webcast, we will cover what we can do if we think there is a breach on our network. We will cover live forensics, cool PowerShell scripts, network, and […] The post Webcast: Think You’re Compromised? What Do We Do Next? appeared first on Black Hills Information Security.

Webcast: Enterprise Recon For Purple Teams

February 19, 2020 13:06 - 1 hour - 29.9 MB

Do you know what your attackers know? There’s a good chance you know, but you might not be aware of just how much information can be found historically and in […] The post Webcast: Enterprise Recon For Purple Teams appeared first on Black Hills Information Security.

Webcast: Linux Command Line Dojo with Hal Pomeranz

February 17, 2020 13:05 - 1 hour - 28.1 MB

In this webcast, we have our friend Hal Pomeranz sharing his massive knowledge on Linux. If you’re new to Linux, or if you know it and just want to hear […] The post Webcast: Linux Command Line Dojo with Hal Pomeranz appeared first on Black Hills Information Security.

Webcast: Introducing Competitive Backdoors & Breaches and More!

February 12, 2020 13:11 - 1 hour - 32 MB

Backdoors & Breaches kind of took off. In case you don’t know, Backdoors & Breaches is an Incident Response Card Game to help people better understand the various attacks and defenses used […] The post Webcast: Introducing Competitive Backdoors & Breaches and More! appeared first on Black Hills Information Security.

Webcast: Getting Started in Cyber Deception

February 10, 2020 13:07 - 59 minutes - 28.9 MB

Ever wanted to get started in cyber deception? Ever wanted to do it for free? In this BHIS webcast, we will cover some basic, legal, and easy tools/techniques to get […] The post Webcast: Getting Started in Cyber Deception appeared first on Black Hills Information Security.

Podcast: Passwords: You Are the Weakest Link

January 17, 2020 13:38 - 1 hour - 31.9 MB

Why are companies still recommending an 8-character password minimum?  Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment. Multiple service providers recommend […] The post Podcast: Passwords: You Are the Weakest Link appeared first on Black Hills Information Security.

Webcast: Sacred Cash Cow Tipping 2020

January 14, 2020 17:36 - 1 hour - 29.4 MB

Want to learn how attackers bypass endpoint products? Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_SacredCashCowTipping2020.pdf 3:41 – Alternate Interpreters 9:19 – Carbon Black Config Issue 15:07 – Cisco […] The post Webcast: Sacred Cash Cow Tipping 2020 appeared first on Black Hills Information Security.

Webcast: Let’s Talk About ELK Baby, Let’s Talk About You and AD

January 07, 2020 13:03 - 58 minutes - 30.8 MB

BHIS’ Defensery Driven Duo Delivers Another Delectable Transmission! We know you are worried about your networks. After hours of discussion, we’ve come to the realization that some of our dedicated […] The post Webcast: Let’s Talk About ELK Baby, Let’s Talk About You and AD appeared first on Black Hills Information Security.

Webcast: Passwords: You Are the Weakest Link

December 16, 2019 16:07 - 1 hour - 31.9 MB

Why are companies still recommending an 8-character password minimum?  Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment. Multiple service providers recommend […] The post Webcast: Passwords: You Are the Weakest Link appeared first on Black Hills Information Security.

Podcast: Attack Tactics 6! Return of the Blue Team

May 30, 2019 18:08 - 56 minutes - 77.1 MB

Download slides: https://www.activecountermeasures.com/presentations In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5!!! Originally recorded […] The post Podcast: Attack Tactics 6! Return of the Blue Team appeared first on Black Hills Information Security.

Podcast: Weaponizing Corporate Intel. This Time, It’s Personal!

May 11, 2019 15:26 - 56 minutes - 77.7 MB

Beau Bullock & Mike Felch// Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester […] The post Podcast: Weaponizing Corporate Intel. This Time, It’s Personal! appeared first on Black Hills Information Security.

BHIS PODCAST: Tracking attackers. Why attribution matters and how to do it.

March 18, 2019 15:54 - 54 minutes - 75.2 MB

In this BHIS podcast, originally recorded as a live webcast, we cover some new techniques and tactics on how to track attackers via various honey tokens.  We cover how to […] The post BHIS PODCAST: Tracking attackers. Why attribution matters and how to do it. appeared first on Black Hills Information Security.

BHIS PODCAST: Endpoint Security Got You Down? No PowerShell? No Problem.

March 06, 2019 15:08 - 54 minutes - 74.8 MB

Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs & Windows Defender every time you need to pop a box?  In this one-hour podcast, originally recorded as […] The post BHIS PODCAST: Endpoint Security Got You Down? No PowerShell? No Problem. appeared first on Black Hills Information Security.

BHIS Podcast: Blockchain and You! InfoSec Edition

February 27, 2019 21:41 - 57 minutes - 78.5 MB

Take a good look at Bitcoin right now… these are the unlucky ones. These are the unfortunate souls who jumped on another overinflated balloon. But, does this Bitcoin crash completely […] The post BHIS Podcast: Blockchain and You! InfoSec Edition appeared first on Black Hills Information Security.

PODCAST: Sacred Cash Cow Tipping 2019

January 15, 2019 17:17 - 46 minutes - 63.2 MB

Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, “Why do these endpoint security bypass techniques still work? Why?” The goal of this is to […] The post PODCAST: Sacred Cash Cow Tipping 2019 appeared first on Black Hills Information Security.

PODCAST: RDP Logging Bypass and Azure Active Directory Recon

December 28, 2018 18:52 - 53 minutes - 73.9 MB

For this podcast we cover a couple of different topics. First, we talk about how to password spray in a non-attributable sort of way. Beau found a way to obfuscate […] The post PODCAST: RDP Logging Bypass and Azure Active Directory Recon appeared first on Black Hills Information Security.

PODCAST: BHIS Sorta Top Used Tools of 2018

December 17, 2018 17:33 - 50 minutes - 69.8 MB

In this webcast we cover some of the core tools we use all the time at Black Hills Information Security. However, there’s a twist. We don’t talk about Nessus, Nmap, […] The post PODCAST: BHIS Sorta Top Used Tools of 2018 appeared first on Black Hills Information Security.

PODCAST: Raising Hacker Kids

December 04, 2018 17:32 - 46 minutes - 63.6 MB

Yes.. Ethical Hacker Kids. The holidays are coming up! Here John & Jordan cover the different games, tools and gifts we can give kids that help teach them the trade. […] The post PODCAST: Raising Hacker Kids appeared first on Black Hills Information Security.

PODCAST: Blue Team-Apalooza

November 15, 2018 16:57 - 48 minutes - 66.7 MB

Over the past few months, we have discovered a couple trends that organizations seem to be missing. No silver bullets, just some general vulnerability issues we are seeing again and […] The post PODCAST: Blue Team-Apalooza appeared first on Black Hills Information Security.

PODCAST: Creating & Keeping a Malware Zoo

October 09, 2018 14:45 - 41 minutes - 56.4 MB

Join John as he covers what he and the BHIS Systems team have been working on lately – creating a C2/Implant/Malware test bed. Testing our C2/malware solutions is important because […] The post PODCAST: Creating & Keeping a Malware Zoo appeared first on Black Hills Information Security.

PODCAST: John Strand’s 5 Year Plan into InfoSec Part 2

September 24, 2018 17:50 - 49 minutes - 68.3 MB

John Strand shares some of his own journey into information security and also his ideas and tips for those wanting to get into the industry from the start, or those […] The post PODCAST: John Strand’s 5 Year Plan into InfoSec Part 2 appeared first on Black Hills Information Security.

PODCAST: Beacon Analysis

September 17, 2018 16:21 - 48 minutes - 67.3 MB

Join special guest Chris Brenton, COO of Active Countermeasures, as he discusses the anatomy of beacons and why you need to be looking for them during a threat hunt. He […] The post PODCAST: Beacon Analysis appeared first on Black Hills Information Security.

PODCAST: What Is a Red Team, Anyway?

September 10, 2018 15:01 - 36 minutes - 50.6 MB

Dakota Nelson // Dakota talks about the pentester pyramid of pain and the different types of tests available from an information security firm. See his slides here: https://blackhillsinformationsecurity.shootproof.com/gallery/7404264/ Extra links & […] The post PODCAST: What Is a Red Team, Anyway? appeared first on Black Hills Information Security.

PODCAST: From Active Countermeasures – Attack Tactics 4

August 28, 2018 16:52 - 52 minutes - 72.3 MB

Join John Strand as he continues his Attack Tactic series this time with the defense ideas for the attacks mentioned in episode 3 (see more here) To see the entire […] The post PODCAST: From Active Countermeasures – Attack Tactics 4 appeared first on Black Hills Information Security.

PODCAST: Active Directory Best Practices that Frustrate Pentesters

August 13, 2018 15:56 - 1 hour - 83.9 MB

// Jordan Drysdale and Kent Ickler talk about Best Practices for setting up Active Directory. Bre joins as fake Sierra to host and ask questions from the audience since real […] The post PODCAST: Active Directory Best Practices that Frustrate Pentesters appeared first on Black Hills Information Security.

PODCAST: Security Policy: Fact Fiction or Implement the Marquis de Management

July 30, 2018 16:12 - 50 minutes - 69.4 MB

CJ Cox talks about the highs, lows, hows and why’s of security policy. // Show Notes Why are we doing this? Do you hate your audience? GDPR was bad enough. […] The post PODCAST: Security Policy: Fact Fiction or Implement the Marquis de Management appeared first on Black Hills Information Security.

PODCAST: Highly Caffeinated InfoSec

July 16, 2018 14:20 - 51 minutes - 70.5 MB

Join Beau Bullock and Mike Felch as they talk about ways to learn more, network and wake up your inner hacker. See the full episode here and look at the slides […] The post PODCAST: Highly Caffeinated InfoSec appeared first on Black Hills Information Security.

PODCAST: Attack Tactics Part 3: No Active Directory? No Problem!

July 16, 2018 13:21 - 49 minutes - 67.7 MB

John Strand talks about how BHIS pen tests companies who use the cloud. Want to know how you can defend against attacks in your cloud infrastructure? Keep your eyes peeled for […] The post PODCAST: Attack Tactics Part 3: No Active Directory? No Problem! appeared first on Black Hills Information Security.

PODCAST: Lee Kagan & Beau Bullock talk C2

July 12, 2018 13:57 - 44 minutes - 61.2 MB

Special guest Lee Kagan from RedBlack Security talks about his script, his previous guest posts and the future of C2 with Beau Bullock and Sierra. Check out these links: How […] The post PODCAST: Lee Kagan & Beau Bullock talk C2 appeared first on Black Hills Information Security.

PODCAST: Hacker Tools, Compliments of Microsoft

July 02, 2018 16:21 - 51 minutes - 70.7 MB

Sally Vandeven & David Fletcher // This is the podcast version of Sally & David’s webcast. For the whole webcast see our webcast post. Links that are mentioned in this […] The post PODCAST: Hacker Tools, Compliments of Microsoft appeared first on Black Hills Information Security.

PODCAST: Testing G Suites with MailSniper

June 20, 2018 13:02 - 46 minutes - 64.5 MB

Matt Toussain goes through how Mailsniper can be the penetration tester’s best friend. If you haven’t been using this tool in your tests you might start now! Check out the […] The post PODCAST: Testing G Suites with MailSniper appeared first on Black Hills Information Security.

PODCAST: Attack Tactics Part 2

June 13, 2018 13:36 - 1 hour - 84.3 MB

John talked about how we’d attack, here’s how you can defend against those attacks. Grab the slides here: https://blackhillsinformationsecurity.shootproof.com/gallery/6843799/ The post PODCAST: Attack Tactics Part 2 appeared first on Black Hills Information Security.

PODCAST: Attack Tactics Part 1

June 13, 2018 13:30 - 55 minutes - 75.5 MB

This is the audio only version of John’s webcast about how we would attack your company during a pentest. Grab his slides here:  https://blackhillsinformationsecurity.shootproof.com/gallery/6843799/ The post PODCAST: Attack Tactics Part 1 appeared first on Black Hills Information Security.

Twitter Mentions

@pythonresponder 1 Episode
@bushidotoken 1 Episode
@skelsec 1 Episode
@edclowes 1 Episode
@amateuradam 1 Episode