Archive for 2018
Trick or Treat: Halloween PCAP Challenge from Cloudshark
TL;DR During Halloween, a company called Cloudshark released a Packet Capture challenge that involved finding hidden “pumpkins” that were hidden in packets. Two SealingTech employees, Tony Efantis and Scott Lohin, participated in the challenge and found all five pumpkins. This challenge was a lot of fun, and we thank Cloudshark for creating it for the…
Read MoreHow to Script Large Ixia Breaking Point Network Profiles
Background My team at SealingTech was tasked with testing the performance of a router that would be a tunnel endpoint for many different Site to Site VPN connections from various places. We were given requirements that it needed to support thousands of tunnels and VRFs and lots of bandwidth (upwards of 20 Gb/s). We had…
Read MoreSR-IOV and Promiscuous Mode
For the past year, SealingTech’s Innovation Team has been working on an open source side-project called Expandable Defensive Cyber Operations Platform (EDCOP), with the goal of building a highly scalable containerized network security platform. I always tell people that if they want to try it on hardware, they need to get an Intel X710 or…
Read MoreCisco Live! 2018 – Orlando, FL
I am fortunate to work for a company that truly believes in continuing education for all it’s employees (one of the many perks of working at SealingTech). Each employee gets a set amount to spend to further their education. While some choose the collegiate path, I have chosen the certification path where I have gone…
Read MoreHost Based Risk Scoring (Part 2): Calculating the Vulnerability Level of a System
This is Part 2 of the Host Based Risk Scoring series. If you haven’t checked out Part 1, check out the post at Host Based Risk Scoring (Part 1). Please note that information in these articles are taken from my personal ideas and experience. I’d love to hear your comments and thoughts on these concepts.…
Read MoreAdventures in Suricata (Part 1): Low Cost Intrusion Detection System
Welcome to the Adventures in Suricata series! Over the past couple months I have been exploring Suricata, an open source Intrusion Detection System (IDS), by standing it up in my virtualized ESXi server at home. By sharing my own experiences with you, I hope to overcome the misconception that IDS is only viable for large…
Read MoreBSidesCharm 2018
We had such a great time at BSidesCharm 2018 – so much so that I felt compelled to write about it. Over the past couple years I have attended this event on behalf of SealingTech, and I have seen the conference grow and change locations. The conference had a little different feel to it this…
Read MoreHost Based Risk Scoring (Part 1): How do you calculate Risk?
Hey all! This is the first post in a series about the concepts of a Host Based Risk Scoring System. This is an idea I had a few years ago, while doing a lot of testing of McAfee and Symantec host products. The work involved trying to determine how effective the products were against varying…
Read MoreSwipe right…into your next job
Maybe it’s my recent re-introduction into singledom, or maybe it’s because today is Valentine’s Day, but I can’t help but notice the similarities between dating and looking for a job. I’ve introduced my best friends to their now spouses and I spend my work-day matching the right people with the right positions. Recruiters are born…
Read More