| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Sure, your Bro instance has caught an attacker or two, but has your helpdesk used the log data to diagnose devices with misconfigured interfaces? Has your networking team used Nmap to test their firewall configurations? Has management been denying your request to spin up new tools because they can only be used for security?
Security tools are typically powerhouse tools with lots of functionality. In this talk we’ll discuss using automated NMAP scripts, Bro IDS, Wireless applications, and other “security” tools for more than what they were originally intended for. Network Security Administrator, die-hard VIM with spaces user, corgi lover, and cyber-security fanatic.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast