4 minSCADA Hacking: Finding and Enumerating SCADA sites with nmap and nmap scriptsWelcome back, my hacker novitiates! With this lab, we will conduct recon on a SCADA target using port scanning and nmap scripts. Up until...
5 minSCADA Hacking: Finding SCADA Systems using ShodanWelcome back, my aspiring cyber warriors! Previously, I wrote a tutorial on using Shodan--the world's most dangerous search engine--to...
4 minSplunk for Security Monitoring, Part 2 (Splunk Processing Language Basics)Welcome back, my greenhorn hackers! In an earlier tutorial, I introduced you to Splunk for Security Monitoring. In this installment, we...
6 minUsing Shodan: The World's Most Dangerous Search EngineWelcome back, my aspiring cyber warriors! Nearly all of us have used a search engine such as Google or Bing to find material on the web....