highlight
Webinar: Bad As You Want To Be – Adversary Emulation Basics
Register Now to Amp Up Your Red Team! OK… so your infrastructure is pretty much locked down, your SOC is solid, you do regular pentests and even leveled up to include threat ...
Video: IoT Hacking 101 – Firmware Funhouse
Watch Now for a Virtual IoT Village with a Hands-On Firmware Hacking Lab! Video and Slide Deck from EH-Net Live! April 2020 Every device imaginable now has Internet access. IoT promises to ...
Webinar: IoT Hacking 101 – Firmware Funhouse
Register Now for a Virtual IoT Village with a Hands-On Firmware Hacking Lab! Every device imaginable now has Internet access. IoT promises to bring supply chain efficiency, decreased maintenance downtime, home conveniences, ...
Video: Deepfakes – A Technical Peek Behind the Curtain
Watch Now for the Technical Foundations of AI for Deepfakes! Video and Slide Deck from EH-Net Live! March 2020 We’ve all seen deepfakes on the Interwebs… from funny videos to politics and, ...
Webinar: Deepfakes – A Technical Peek Behind the Curtain
Register Now for the Technical Foundations of AI for Deepfakes! We've all seen deepfakes on the Interwebs... from funny videos to politics and, of course, from the impetus behind many technical innovations, ...
WMI 101 for Pentesters
PowerShell has gained popularity with SysAdmins and for good reason. It’s on every Windows machine (and now some Linux machines as well), has capabilities to interact with almost every service on every ...
Video: Shellcode for the Masses
Watch Now to Learn Shellcoding from the Ground Up! Video and Slide Deck from EH-Net Live! January 2020 In the art of binary exploitation, there is one ominous “hacker” term you will ...
BBP: My Path to the CISO Chair
Testing, testing. May I have your attention, please. *Ahem* Allow me to introduce myself and this new series of articles for The Ethical Hacker Network. My name is Stephanie, better known as ...
Webinar: Shellcode for the Masses
Register Now to Learn Shellcoding from the Ground Up! In the art of binary exploitation, there is one ominous "hacker" term you will hear quite often: shellcode. What is shellcode? How can ...
Tshark: 7 Tips on Wireshark’s Command-Line Packet Capture Tool
If your current capture process can’t keep up with the traffic and drops packets – you need a new capture process. No debates here. Analyzing a trace file in which you don’t ...