Posted on Nov 20, 2017
Building a Threat Hunting Lab (Part 1): Intro and Setting up the networking environment
595
1
7
1
1
0
Posted 7 y ago
Responses: 3
This is a pet subject of mine. For the past two years I have been publishing a series of articles called cyber-attacks what is preventing prevention. It is completely possible to prevent and or mitigate the three types of attack which are presently causing the biggest problems to consumer in industry. I would love to speak with you about this please feel free to connect with me here in Rally Point if you would like to discuss this further. I would love the opportunity to share my thoughts with you and receive your feedback.
(0)
(0)
Lt, did you just visit my folks at the 833d today? We’re moving in that direction but I’ve been too busy with mission planning to see where they are. Some folks came by and I escorted to the war room but I didn’t catch their names/units.
(0)
(0)
Maj (Join to see)
No Sir. I was stuck in my little basement office in Texas doing Network Traffic Analysis all day. I'm glad to hear that we've got some folk learning/doing IR.
(0)
(0)
Maj Kevin "Mac" McLaughlin
Ours is not an IR mission (at least unless we’re otherwise ordered to). You should ask questions about the NCPTs when you get back in the office.
(0)
(0)
Maj (Join to see)
Thanks Sir. This actually has been a blast to build and significantly harder than I thought.
My end goal with this is to migrate it to a dedicated 1U server and let people remotely access it for training.
My end goal with this is to migrate it to a dedicated 1U server and let people remotely access it for training.
(0)
(0)
Read This Next