|
You are here |
www.anvilsecure.com | ||
| | | | |
0xcybery.github.io
|
|
| | | | | Using Scapy to generate packets that can test/trigger rule in Snort or Suricata. | |
| | | | |
vincent.bernat.ch
|
|
| | | | | For ease of configuration, virtual guests are usually connected to a layer 2 network. However, hypervisors can be turned into layer 3 routers... | |
| | | | |
staex.io
|
|
| | | | | DNS protocol is one of the attack vectors on your corporate network and IoT devices in particular. Most operating systems access DNS servers using legacy unencrypted protocol by default despite the fact that there are modern secure enhancements for this protocol: DNSSEC, DNS-over-HTTPS, DNS-over-TLS. In this article we discuss these enhancements and explain how to configure them in your network. | |
| | | | |
wsummerhill.github.io
|
|
| | | Malware Development Introduction (aka Malware Dev 101), Part 1 | ||