Technical Information Security Content & Discussion

10 readers
1 users here now

/r/netsec is a community-curated aggregator of technical information security content. Our mission is to extract signal from the noise — to...

founded 1 year ago
MODERATORS
26
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/ilay789 on 2024-01-18 13:49:44+00:00.

27
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/dx7r__ on 2024-01-18 09:10:48+00:00.

28
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/guedou on 2024-01-16 16:35:13+00:00.

29
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/albinowax on 2024-01-16 15:36:27+00:00.

30
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/ZephrX112 on 2024-01-16 13:03:25+00:00.

31
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/SRMish3 on 2024-01-17 21:26:06+00:00.

32
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/EatonZ on 2024-01-17 16:58:26+00:00.

33
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/netbiosX on 2024-01-15 11:31:25+00:00.

34
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/zolakrystie on 2024-01-15 06:01:44+00:00.

35
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/OSTEsayed on 2024-01-14 18:00:29+00:00.


Automate the process of analyzing web server logs with the Python Web Log Analyzer. This powerful tool is designed to enhance security by identifying and detecting various types of cyber attacks within your server logs. Stay ahead of potential threats with features that include: Attack Detection: Identify and flag potential Cross-Site Scripting (XSS), Local File Inclusion (LFI), Remote File Inclusion (RFI), and other common web application attacks.

Rate Limit Monitoring: Detect suspicious patterns in multiple requests made in a short time frame, helping to identify brute-force attacks or automated scanning tools.

Automated Scanner Detection: Keep your web applications secure by identifying requests associated with known automated scanning tools or vulnerability scanners.

User-Agent Analysis: Analyze and identify potentially malicious User-Agent strings, allowing you to spot unusual or suspicious behavior.

36
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/cyberforce218 on 2024-01-12 16:23:36+00:00.

37
1
CCDC 2024 (www.nationalccdc.org)
submitted 11 months ago by [email protected] to c/[email protected]
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/TopShelfHockeyMN on 2024-01-13 22:29:04+00:00.


Is anyone else competing in the 2024 Collegiate Cyber Defense Competition? Our regionals are coming up.

Looking for advice from those that have competed in the past. What kind of environment can I anticipate to encounter? I’m in no means in a position to win the competition, our University is fielding 2 teams and I am on the alternate team. Our main team, comprised of past CCDC participants, seems to know exactly what’s going to happen, have plenty of GitHub repos at their disposal, while we are kind of scratching our heads.

I’m an old head with plenty of knowledge on the CISCO stack, but the captains all say this is irrelevant to the competition now. It’s kind of discouraging talking about how we used to hop VLANs using 802 Q Double Encapsulation, capturing, spoofing in hex, and flooding ARP replies for ARP cache poisoning, when these current students have never even used the Cisco iOS CLI, and then additionally to be told that my skills and knowledge are archaic thinking. How can transform/evolve my thinking to be effective in this competition?

38
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/arch_rust on 2024-01-13 22:03:40+00:00.

39
1
Scame (github.com)
submitted 11 months ago by [email protected] to c/[email protected]
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/Technical_Shelter621 on 2024-01-13 20:43:08+00:00.


Introducing Scanme, a Go Package for Effortless Network Scanning ⏳

Are you passionate about network exploration and security? Say hello to Scanme! 🌐 What is Scanme? Scanme is a straightforward Go package designed to simplify network scanning processes using SYN (stealth) scans. This tool allows you to effortlessly scan a single IP address for open ports and delve deeper into the realm of network scanning techniques. Scanme stands out by providing an automated solution for fast and efficient scans across all 65535 TCP ports! 🔄

40
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/dima11235813 on 2024-01-13 19:15:12+00:00.

Original Title: Hedera and Algorand team up to create the DeRec Alliance, wow this is huge! This is a pretty big deal for security on the decentralized web. I generated this article while researching it, you may find it interesting. Note: Contains some affiliate links at the end for cryptography books.

41
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/dx7r__ on 2024-01-13 12:28:06+00:00.

42
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/gid0rah on 2024-01-13 10:51:22+00:00.

43
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/m417z on 2024-01-13 10:11:40+00:00.

44
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/42-is-the-number on 2024-01-12 15:10:03+00:00.

45
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/scopedsecurity on 2024-01-12 14:37:51+00:00.

46
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/scopedsecurity on 2024-01-12 14:38:28+00:00.

47
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/scopedsecurity on 2024-01-12 14:38:28+00:00.

48
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/scopedsecurity on 2024-01-12 14:37:51+00:00.

49
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/pracsec on 2024-01-12 14:06:17+00:00.


This post covers the use of internal proxy techniques and some employment considerations.

50
 
 
This is an automated archive.

The original was posted on /r/netsec by /u/thinkV on 2024-01-12 11:52:18+00:00.

view more: ‹ prev next ›