Active Countermeasures Webcasts
Recordings of our live online public webcasts.
How to Use a Raspberry Pi as a Network Sensor
Running a network sensor, IDS, or IPS can be a costly venture; the high-end ones can cost more than a used car. In this webcast, we’ll cover running a network sensor using a Raspberry Pi, a miniature single-board computer that runs most anything you can run under Linux
Network Decoding Command and Control Channels
In this webcast, we do a deep dive on the network communications of multiple command and control tools. We start with a pcap analysis (Wireshark, woot!) and work our way through open source and commercial tools that can help simplify the process.
Attack Tactics: Part 4
For this next installment of the Attack Tactics series, John looks at cloud security defenses. In the previous webcast, we covered the tools Black Hills Information Security (our sister company) uses to attack cloud-based two-factor authentication and turn cloud services against each other for password spraying.
Attack Tactics: Part 2
This is the second part of John’s series about Attack Tactics. In the first part we discussed how we’d attack. Now, we cover the same attack, but this time we are covering the defensive components the organization could have implemented to stop us every step of the way.