JBC Information Technology
  • Approach
  • Services
  • Insights
  • Contact
Select Page
Shark Jack: The Baby Yoda of Network Attack Tools

Shark Jack: The Baby Yoda of Network Attack Tools

by John Breth | Dec 31, 2019 | Cybersecurity, InfoSec, IT Engineering

This past Black Friday, I went on a bit of a hacking tools shopping spree at Hak5. Today, I’m going to give a brief rundown of their Linux based network attack tool call Shark Jack (and why it’s similar to Baby Yoda). Shark Jack is to be used in...

Recent Posts

  • How I Passed All 6 Juniper Networks Associate Certs | JNCIA-JUNOS, SEC, CLOUD, DEVOPS, MISTAI, JNCDA
  • 8 Things New Network Engineers Must Know
  • CompTIA Network+ Study Lab #8 | Understanding Static Routes, RIP and EIGRP
  • How I Passed the Juniper Networks JNCIA-MistAI Exam | JNCIA-MistAI Review and Study Tips
  • CompTIA Network+ Study Lab #7 | Understanding ICMP with Wireshark

Archives

  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019

Categories

  • Cybersecurity
  • Governance
  • InfoSec
  • IT Engineering
  • IT Operations
  • Lab Videos
  • Network Engineering

Subscribe

SUBSCRIBE TO THE CYBERINSIGHT® BLOG

We're really excited about writing our blog articles! Enter your email address and every time we publish a new one you'll get an instant notification! (We promise, SPAM is not our plan!)

  • Company
  • Join Our Team
  • Contact
© 2019 J. B. Consultants, LLC. All rights reserved. Legal & Privacy Policy.