Webcast Recording: Man in the Middle Attacks
In this webcast we walked through the current super cool crop of MITM tools. We looked at Bettercap, MITMf and discussed LLMNR and WPAD poisoning attacks. Also, this was a new […]
In this webcast we walked through the current super cool crop of MITM tools. We looked at Bettercap, MITMf and discussed LLMNR and WPAD poisoning attacks. Also, this was a new […]
John Strand // Last week BHIS took a new direction as a company. (Warning, this blog is not technical. But it is important.) In the past few years we’ve grown […]
John Strand // Recently on an episode of Security Weekly, I lost my mind on threat intelligence feeds. I feel just a bit bad about it. Right Apollo? But… I […]
John Strand // One of the more difficult aspects of getting started in any new field is knowing where to begin. When I got started in this field in 2000 […]
John Strand // AV is Dead Long Live Whitelisting. We have been discovering more and more of our tests bypass AV controls with ease. We have yet to see any iteration or […]
John Strand // There have been quite a few articles lately on how compliance standard X or Y is broken. Unfortunately, this often leads to blaming the nameless and faceless people behind the […]