Or, “How I integrated python-secrets with Splunk’s Attack Range framework, and how you can do the same for your open source project!”

Photo by Michael Dziedzic on Unsplash

Saying “PCAP, or it didn’t happen!” is all well and good but if you can’t see into the PCAP, how do you know what happened?

Photo by Nina Ž. on Unsplash
  • Those hoping…

Looking for malware in all the right places (with the right tool!)

A screen image captured from a computer infected with NotPetya ransomware, extorting the user for Bitcoins to decrypt files.
NotPetya screenshot from CTU-Malware-Capture-Botnet-289–1

How I became the first person to describe the advent of a new class of computer network attack tools.

The University of Minnesota was kept off-line for three days, and I was kept busy for weeks.

Photo by Kelly Sikkema on Unsplash

How I became the first person to describe the advent of a new class of computer network attack tools.

Something is happening, but what?

Eradicating an Intruder from a Network

Photo by Jakob Owens on Unsplash

How I became the first person to describe the advent of a new class of computer network attack tools.

Part 0: The Build Up to Distributed Denial of Service

Photo by Taskin Ashiq on Unsplash

Dave Dittrich

Information Security Researcher, Consultant, Writer. Support my writing by joining Medium https://git.io/JKLPq (affiliate link — I get a portion of your fee)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store