• About Me
  • Archives
    • Incident Response
    • Digital Forensics
    • Malware Analysis
    • Threat Hunting
    • Offense
    • CTF-Walkthrough
  • Twitter
  • About Me
  • Archives
    • Incident Response
    • Digital Forensics
    • Malware Analysis
    • Threat Hunting
    • Offense
    • CTF-Walkthrough
  • Twitter

5th December 2019 | by hilo21

SDN Penetration Testing (PART 3) : Flow-Rule Flooding Attack Using DELTA

The key concept of SDN lies in the decoupling of the data plane and the control plane. In SDN, the switches are free from rigid routing computation and can be focused on packet forwarding.

4th December 2019 | by hilo21

SDN Penetration Testing (PART2) : Setting up the attack scenario

One of the major benefits of SDN environnements is control logic centralization and network programmability which create new threats that did not exist before

23rd November 2019 | by hilo21

SDN Penetration Testing (PART1) : A Step-by-Step Guide for Setting Up DELTA Framework

This is a detailed step-by-step guide for setting up DELTA Framework for SDN security evaluation purposes.

Recent Posts

  • Threat Hunting Lab (Part II) : Sending PfSense Netflow data to Elastic Stack
  • Threat Hunting Lab (Part I): Setting up Elastic Stack 7.2.1
  • Protected: CTF : oBfsC4t10n [HackTheBox]
  • SDN Penetration Testing (PART 3) : Flow-Rule Flooding Attack Using DELTA
  • SDN Penetration Testing (PART2) : Setting up the attack scenario
  • SDN Penetration Testing (PART1) : A Step-by-Step Guide for Setting Up DELTA Framework

Archives

  • March 2020 (1)
  • February 2020 (1)
  • January 2020 (1)
  • December 2019 (2)
  • November 2019 (1)

Categories

  • CTF-Walkthrough
  • Offense
  • Threat Hunting

Tags

ctf elastic htb pentesting SDN TH Threat Hunting

Copyright © 2019 H1L021