by John Breth | Mar 17, 2020 | Cybersecurity, IT Engineering, IT Operations
One thing I’ve noticed in the Infosec/Cyber community (and in the IT community as well, if we’re being completely honest) is a little bit of fear over truly understanding how to subnet. There are many methods out there and some of them work for some...
by John Breth | Feb 27, 2020 | Cybersecurity, InfoSec, IT Engineering, IT Operations
Today’s blog post is the first part of our #30DaysofJuniper information sharing campaign. For the past month, we have been posting daily tips on Juniper configurations to help novice and experienced engineers alike. This is our second campaign like this, as we...
by John Breth | Jan 20, 2020 | Cybersecurity, InfoSec, IT Engineering
This is our second review article of the Hak5 pentesting tools. After previously covering the Shark Jack, today we will be focusing on the Screen Crab. Hak5 bills the Screen Crab as a “stealthy video man-in-the-middle implant.” It sits inline between an...
by John Breth | Jan 9, 2020 | Cybersecurity, IT Engineering, IT Operations
Today’s blog post is the second and final part of our #30DaysofCisco information sharing campaign. For a little over the past month, we have been posting daily tips on Cisco configurations to help novice and experienced engineers alike. This campaign was...
by John Breth | Dec 31, 2019 | Cybersecurity, InfoSec, IT Engineering
This past Black Friday, I went on a bit of a hacking tools shopping spree at Hak5. Today, I’m going to give a brief rundown of their Linux based network attack tool call Shark Jack (and why it’s similar to Baby Yoda). Shark Jack is to be used in...