-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Karthik, R. Burp Suite Guide: Part 1 – Basic Tools, Part 2 – Intruder and repeater tools, Part 3 – Sequencer, decode and composer. SearchSecurity.techtarget.in. Karthic’s terse three part guide provides a […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Zeltser, L. (2014). “Ouch! What Is Malware,” The Monthly Security Newsletter for Computer Users, The SANS Institute. This reading provides a short high-level overview of malware, its sources, and prote […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Allen, M. (2006). “Social Engineering: A Means To Violate A Computer System”, SANS Institute Reading Room. Allen’s article provides a good introduction and overview of social engineering. It covers defini […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Armstrong, T. (2003), “Netcat – The TCP/IP Swiss Army Knife”, Information Security Reading Room, SANS Institute. Based on Nmap’s optimized and tested passive and active scanning libraries, Ncat is a powerfu […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
King, T. (2007). “Packet Sniffing In a Switched Environment”, SANS Institute InforSec Reading Room. The article introduces packet sniffing as largely a within network (“internal”) threat to unencrypted and poorl […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
McGreevy, J.P. (2002). “Footprinting: What Is it, Who Should Do It, and Why?”, SANS Institute Information Security Reading Room, Sans Institute. In planning an attack, the author instructs that “Footprinting” […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Week Four Reading: Mitchel, J. (2002). Proactive Vulnerability Assessments with Nessus, SANS Institute. Once setup and configured, Nessus is a powerful tool for applying signatures for detecting known […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
Using Open Source Reconnaissance Tools for Business Partner Vulnerability Assessment (Young, S., 2014) . This article began with a warning about the legal risks of assessing the vulnerabilities of websites and […]
-
David Lanter posted a new activity comment 9 years, 2 months ago
My takeaway from Chapter 2 – Enterprise Data Center Topology: It seems that a good network architecture structurally decomposes incoming and outgoing traffic into n-tier functional service areas (i.e. client facing web tier, application tier, and database tier) to enable matching the placement of appropriate traffic-oriented defense mechanisms to…[Read more]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
My takeaway from Chapter 2 – Enterprise Data Center Topology: It seems that a good network architecture structurally decomposes incoming and outgoing traffic into n-tier functional service areas (i.e. client […]
-
David Lanter commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 9 years, 9 months ago
1 Key point: The section in Herrod’s article, “Where is enterprise infrastructure headed in 2015?” titled “Containers get down to work” caught my interest, opens up the possibility of using a loosely coupled standardized integration platform for segregating and plug ‘n playing software components (whether they be custom or open source) to enable…[Read more]
-
David Lanter wrote a new post on the site National Center of Academic Excellence in Cybersecurity 10 years, 8 months ago
The Institute for Business and Information Technology (IBIT) report – Barbarians Inside the Gate: Dealing With Advanced Persistent Threats authored by Gregory Senko, discussed advanced persistent threats (AP […]
-
David Lanter commented on the post, Week 14 Materials, on the site Protection of Information Assets 11 years, 6 months ago
A related article that came out today: Prolexic warns of spike in DrDoS(Distributed Reflection and Amplification Denial of Service ) attacks
Common networked devices: routers, hubs, printers, cameras, and sensors […] -
David Lanter commented on the post, Week 14 Materials, on the site Protection of Information Assets 11 years, 6 months ago
How to Report a DDoS Attack on the ICANN Blog (Internet Corporation for Assigned Names and Numbers)
“While ICANN’s role in mitigating these threats is limited, the Security Team offers these insights to raise […] -
David Lanter commented on the post, Week 13 Materials, on the site Protection of Information Assets 11 years, 6 months ago
In the News: Letter from PayPal Information Risk Management to Chairman of the Board of Internet Corporation for Assigned Names and Numbers: There appears to be anticipation that the introduction of new Internet […]
-
David Lanter commented on the post, Week 13 Materials, on the site Protection of Information Assets 11 years, 6 months ago
Vaca’ chapters 24-27, and the two SANS articles on Open/Closed Public Key and Cyrptographic Hash Functions: The readings left me pondering the complexity of “trust” in working with distributed certificate […]
-
David Lanter commented on the post, Malware Inforgraphic, on the site Protection of Information Assets 11 years, 7 months ago
Interesting information, wonderfully presented. Thank you!
-
David Lanter commented on the post, Week 11 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Vaca Readings: A SAN can be critical infrastructure for facilitating efficient business continuity through centralized data management and protection. Like any critical IT resource, it needs to be planned and […]
-
David Lanter commented on the post, Week 11 Materials, on the site Protection of Information Assets 11 years, 7 months ago
News of the Week: Why Watering Hole Attacks Work
I found this item as I drilled down into news about the IE patches Microsoft is providing this week in part to address “…the series of watering hole attacks […] -
David Lanter commented on the post, Week 10 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Vaca: This week’s readings covered a number of topics pertaining to the nature, benefits, and tradeoffs offered by alternative architectures and approaches to establish, leverage, and consolidate digital […]
- Load More