Security Onion Primer

If you read my article on Security Onion planning and the mention of Snort/Suricata, Bro, and ELSA left you with questions, or if you haven’t read my Security Onion (SO) planning article but are looking for explanations of the various detection and analysis tools then this is the article for you. This is a Security Onion... Continue reading Security Onion Primer

Security Onion Set Up Part 1: Planning

Security Onion is used for network security monitoring in which it analyses network traffic and computer logs sent to it by OSSEC, a host intrusion detection system (HIDS). The Overview section of Security Onion’s Github page describes it as a proactive tool, “Network Security Monitoring (NSM) is, put simply, monitoring your network for security-related events.... Continue reading Security Onion Set Up Part 1: Planning

Anonymous: Operation Beast

Anonymous: Operation Beast purpose is to bring down websites and social media accounts that create and distribute beastiality images and video. Surprisingly, not all states and countries have laws against beastiality partly making Operation Beast a political movement. I had the opportunity to speak with two of the leaders of the operation – Priscilla, and... Continue reading Anonymous: Operation Beast

Anonymous: Operation Child Safety

The hacking group Anonymous came to the forefront of America’s consciousness in 2008 when they took on the Church of Scientology. Anonymous is known as a hacktivist group in which they create operations or projects for specific activist causes. Of all the operations, Operation Child Safety and other pedophile hunting teams discover the most gruesome... Continue reading Anonymous: Operation Child Safety