-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 8 years, 11 months ago
Reading: Dyrmose, M. (2013). Beating the IPS. SANS Institute InfoSec Reading Room. The paper: describes how to build an intrusion protection system research laboratory, introduces four evasion techniques, and […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 8 years, 12 months ago
Burns, S. (2001). “Web Services Security – An Overview”. SANS Institute, InfoSec Reading Room. Web services are software functions provided at a network address that enable machine to machine communication over t […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Reading: Marezzi@gmail.com (2008), “Full SQL Injection Tutorial”. The tutorial describes SQL injection as a code insertion technique for attacking poorly implemented data-driven client-server and n-tier appl […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Karthik, R. Burp Suite Guide: Part 1 – Basic Tools, Part 2 – Intruder and repeater tools, Part 3 – Sequencer, decode and composer. SearchSecurity.techtarget.in. Karthic’s terse three part guide provides a […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Zeltser, L. (2014). “Ouch! What Is Malware,” The Monthly Security Newsletter for Computer Users, The SANS Institute. This reading provides a short high-level overview of malware, its sources, and prote […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Allen, M. (2006). “Social Engineering: A Means To Violate A Computer System”, SANS Institute Reading Room. Allen’s article provides a good introduction and overview of social engineering. It covers defini […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Armstrong, T. (2003), “Netcat – The TCP/IP Swiss Army Knife”, Information Security Reading Room, SANS Institute. Based on Nmap’s optimized and tested passive and active scanning libraries, Ncat is a powerfu […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
King, T. (2007). “Packet Sniffing In a Switched Environment”, SANS Institute InforSec Reading Room. The article introduces packet sniffing as largely a within network (“internal”) threat to unencrypted and poorl […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
McGreevy, J.P. (2002). “Footprinting: What Is it, Who Should Do It, and Why?”, SANS Institute Information Security Reading Room, Sans Institute. In planning an attack, the author instructs that “Footprinting” […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Week Four Reading: Mitchel, J. (2002). Proactive Vulnerability Assessments with Nessus, SANS Institute. Once setup and configured, Nessus is a powerful tool for applying signatures for detecting known […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
Using Open Source Reconnaissance Tools for Business Partner Vulnerability Assessment (Young, S., 2014) . This article began with a warning about the legal risks of assessing the vulnerabilities of websites and […]
-
David Lanter wrote a new post on the site Introduction to Ethical Hacking 9 years, 2 months ago
My takeaway from Chapter 2 – Enterprise Data Center Topology: It seems that a good network architecture structurally decomposes incoming and outgoing traffic into n-tier functional service areas (i.e. client […]
-
David Lanter wrote a new post on the site National Center of Academic Excellence in Cybersecurity 10 years, 7 months ago
The Institute for Business and Information Technology (IBIT) report – Barbarians Inside the Gate: Dealing With Advanced Persistent Threats authored by Gregory Senko, discussed advanced persistent threats (AP […]
-
David Lanter commented on the post, Week 14 Materials, on the site Protection of Information Assets 11 years, 6 months ago
A related article that came out today: Prolexic warns of spike in DrDoS(Distributed Reflection and Amplification Denial of Service ) attacks
Common networked devices: routers, hubs, printers, cameras, and sensors […] -
David Lanter commented on the post, Week 14 Materials, on the site Protection of Information Assets 11 years, 6 months ago
How to Report a DDoS Attack on the ICANN Blog (Internet Corporation for Assigned Names and Numbers)
“While ICANN’s role in mitigating these threats is limited, the Security Team offers these insights to raise […] -
David Lanter commented on the post, Week 13 Materials, on the site Protection of Information Assets 11 years, 6 months ago
In the News: Letter from PayPal Information Risk Management to Chairman of the Board of Internet Corporation for Assigned Names and Numbers: There appears to be anticipation that the introduction of new Internet […]
-
David Lanter commented on the post, Week 13 Materials, on the site Protection of Information Assets 11 years, 6 months ago
Vaca’ chapters 24-27, and the two SANS articles on Open/Closed Public Key and Cyrptographic Hash Functions: The readings left me pondering the complexity of “trust” in working with distributed certificate […]
-
David Lanter commented on the post, Malware Inforgraphic, on the site Protection of Information Assets 11 years, 7 months ago
Interesting information, wonderfully presented. Thank you!
-
David Lanter commented on the post, Week 11 Materials, on the site Protection of Information Assets 11 years, 7 months ago
Vaca Readings: A SAN can be critical infrastructure for facilitating efficient business continuity through centralized data management and protection. Like any critical IT resource, it needs to be planned and […]
-
David Lanter commented on the post, Week 11 Materials, on the site Protection of Information Assets 11 years, 7 months ago
News of the Week: Why Watering Hole Attacks Work
I found this item as I drilled down into news about the IE patches Microsoft is providing this week in part to address “…the series of watering hole attacks […] - Load More