Dec 17, 2016 | White Papers, Publications, Articles
Learning to use packet crafting tools to test our defenses by Mike Poor https://inguardians.box.com/shared/static/4pwaigav97t90b31wvff8mrvl4llb50j.pdf
Dec 17, 2016 | Presentations, White Papers, Publications, Articles
Correlating System and Application Logs with Traffic Traces and IDS Alerts by Mike Poor https://inguardians.box.com/shared/static/papgh6vwh0a4ee4o3snp2dnaz2ey4szq.pdf
Dec 17, 2016 | Presentations, White Papers, Publications, Articles
SANSFIRE Keynote on Early Warning Systems by Mike Poor https://inguardians.box.com/shared/static/hgy9lnemxgxtqjeeettwvq3uyo2cub6w.pdf
Dec 17, 2016 | White Papers, Publications, Articles
By Brian Liang and Jimmy Alderson. This How-to Guide demonstrates how to scale IDS on a large network or ambiguous perimeter using network taps, comparing this to prior methods using network hubs and switch spanning ports....
Dec 17, 2016 | White Papers, Publications, Articles
By Josh Wright.This paper is designed to illustrate the Vista tools useful for wireless penetration testing, the format of which is designed to be easy to read and utilize as a learning tool. Designed after the timeless work of “Unix Power Tools” by Sherry Powers, et...