Top 10 Uses of Wireshark for Hackers Part II

In a world… OK, just kidding. This isn’t a movie trailer. However, the ever-increasing sophistication of attacks on our networks is no joking matter. To bypass firewalls, IDS/IPS, EPS, DLP and a plethora of solutions aimed at stemming the tide, crimi… Continue reading Top 10 Uses of Wireshark for Hackers Part II

Top 10 Uses of Wireshark for Hackers Part II

In a world… OK, just kidding. This isn’t a movie trailer. However, the ever-increasing sophistication of attacks on our networks is no joking matter. To bypass firewalls, IDS/IPS, EPS, DLP and a plethora of solutions aimed at stemming the tide, crimi… Continue reading Top 10 Uses of Wireshark for Hackers Part II

Webinar: Wireshark for Hackers

Register Now for a Packet Level Foundation in Incident Response!
Join Laura Chappell as she demonstrates Wireshark’s use as a network forensics tool. Laura will walk you through some tricks used to detect a bot-infected host, identify characteris… Continue reading Webinar: Wireshark for Hackers

Video: DEF CON Goons, Badges and Talks – Inside the Largest Hacker Con in the World

Get an Insider’s View of DEF CON!
Video and Slide Deck from EH-Net Live! July 2019
As most of you know, Hacker Summer Camp is the affectionate term used to describe the collection of various InfoSec conferences held annually in Vegas. But it all … Continue reading Video: DEF CON Goons, Badges and Talks – Inside the Largest Hacker Con in the World

Top 10 Uses of Wireshark for Hackers Part I

Wireshark fits nicely in any toolbox of the network forensic analyst and ethical hacker. From hundreds of dissectors that decode the protocol and application fields, to the customization capability that enables you to find that one item of interest in … Continue reading Top 10 Uses of Wireshark for Hackers Part I

Webinar: DEF CON Goons, Badges and Talks – Inside the Largest Hacker Con in the World

Register Now to Get an Insider’s View of DEF CON!
Hacker Summer Camp is the affectionate term used to describe the collection of various InfoSec conferences held annually in Vegas. But it all started 27 years ago with DEF CON. And the original is… Continue reading Webinar: DEF CON Goons, Badges and Talks – Inside the Largest Hacker Con in the World

Video: Hacking the Extraterrestrial Internet – Where Fiction Meets Reality

Explore the Tech Behind the Interplanetary Internet!
Video and Slide Deck from EH-Net Live! June 2019
Normal SciFi glosses over a glaring problem with comms through the vastness of space… The Internet, and more specifically the TCP/IP protocol su… Continue reading Video: Hacking the Extraterrestrial Internet – Where Fiction Meets Reality

Book Review – Cybersecurity Blue Team Toolkit

In the world of cyber, there are many different teams and roles to play. The Blue Team generally doesn’t get the spotlight but are vital to the defense of an organization. In the book “Cybersecurity Blue Team Toolkit”, Nadean H. Tanne… Continue reading Book Review – Cybersecurity Blue Team Toolkit

Webinar: Hacking the Extraterrestrial Internet – Where Fiction Meets Reality

Register Now to Explore the Tech Behind the Interplanetary Internet!
Normal SciFi glosses over a glaring problem with comms through the vastness of space… The Internet and TCP/IP suffer a massive self-imposed DOS attack with any disruptions for m… Continue reading Webinar: Hacking the Extraterrestrial Internet – Where Fiction Meets Reality