3 min readLINUX FOR HACKERSLinux Firewalls: Creating an Application Layer IDS/IPS with fwsnortWelcome back, my aspiring cyberwarriors! In a previous tutorial here, I introduced you to the Linux firewall, iptables. iptables enables...
2 min readSNORTSnort Basics for Hackers, Part 6: Configuring Snort to Detect the SolarWinds/Sunburst BackdoorWelcome back, my aspiring cyberwarriors! In recent weeks I'm certain you have heard about the SolarWinds/Sunburst hack. Just to review,...
4 min readEXPLOIT DEVELOPMENTSnort Basics for Hackers, Part 5: Testing your Snort IDS Against Known ExploitsWelcome back, my greenhorn cyber warriors! In my previous posts in this series, we installed Snort, configured Snort, set up Snort to...
4 min readSNORTSnort Intrusion Detection System (IDS) for Hackers, Part 1: Installing SnortWelcome back, my neophyte hackers! In the world of information security, the most common intrusion detection system (IDS) you will ever...
4 min readSNORTSnort Basics: How to Read and Write Snort Rules, Part 1Welcome back, my novice hackers! My recent tutorials have been focused upon ways to NOT get caught. Some people call this...
5 min readSNORTSnort IDS for Hackers, Part 3: Sending Intrusion Alerts to MySQLWelcome back, my hacker novitiates! If you have been following this new Snort series, you know that Snort is the world's most widely used...
5 min readSNORTSnort IDS for Hackers, Part 2: Basic Configuration of your Snort IDSWelcome back, my tenderfoot hackers! As you should know from before, Snort is the most widely deployed intrusion detection system (IDS)...
1 min readSNORTHackers-Arise Purchases Snort Training InstituteToday, Hackers-Arise announced the purchase of the Snort Training Institute! The Snort Training Institute is the premier training...