IT Research

SANS 2018 Holiday Hack Challenge

February 21, 2019

Here at SealingTech we are proud to have a team of engineers who are constantly challenging themselves and each other at work and in their free time! You may recall several other challenges we have blogged about such as Kevin’s work on the IXIA Breaking Point Network Profiles challenge, or Scott and Tony’s solutions for the Cloudshark Halloween PCAP…

How to Script Large Ixia Breaking Point Network Profiles Part 2: Electric Boogaloo

January 16, 2019

Background Hello everyone, hope you’re doing well today. Before reading this blog post, I recommend you read my previous blog post that describes the problem my team was trying to solve and documents our solution to this problem. How to Script Large Ixia Breaking Point Network Profiles Did you read it? Good! After posting that…

Trick or Treat: Halloween PCAP Challenge from Cloudshark

November 14, 2018

TL;DR During Halloween, a company called Cloudshark released a Packet Capture challenge that involved finding hidden “pumpkins” that were hidden in packets. Two SealingTech employees, Tony Efantis and Scott Lohin, participated in the challenge and found all five pumpkins. This challenge was a lot of fun, and we thank Cloudshark for creating it for the…

How to Script Large Ixia Breaking Point Network Profiles

August 3, 2018

Background My team at SealingTech was tasked with testing the performance of a router that would be a tunnel endpoint for many different Site to Site VPN connections from various places. We were given requirements that it needed to support thousands of tunnels and VRFs and lots of bandwidth (upwards of 20 Gb/s). We had…

SR-IOV and Promiscuous Mode

July 30, 2018

For the past year, SealingTech’s Innovation Team has been working on an open source side-project called Expandable Defensive Cyber Operations Platform (EDCOP), with the goal of building a highly scalable containerized network security platform. I always tell people that if they want to try it on hardware, they need to get an Intel X710 or…

Adventures in Suricata (Part 1): Low Cost Intrusion Detection System

May 9, 2016

Welcome to the Adventures in Suricata series! Over the past couple months I have been exploring Suricata, an open source Intrusion Detection System (IDS), by standing it up in my virtualized ESXi server at home. By sharing my own experiences with you, I hope to overcome the misconception that IDS is only viable for large…

SealingTech CTF Walkthrough

April 25, 2016

This weekend, SealingTech ran a Capture-The-Flag event at BSidesCharm for 30 people. This event challenged members of the local InfoSec community to identify and exploit the vulnerabilities of a running system in our RackSpace cloud. The SealingTech CTF was a very exciting event for us to set up and observe people participating in. We had a lot of participants…

Understanding PCI DSS and the Importance of Compliance

August 21, 2015

The Payment Card Industry Data Security Standard (PCI DSS) was originally established in 2004 as a standardization of security practices for any organization that handles or uses payment collection via credit cards. This standardization is required by all major credit card carriers and is regulated by the Payment Card Security Standards Council (PCI SSC). This…

DEF CON 23: Humans, The Wall of Sheep, and The Number 23

August 18, 2015

The scene of DEF CON on August 6th, 2015 at the Paris Hotel in Las Vegas around 6:00am, was filled with an array of hackers and industry professionals alike. What may seem as an unlikely combination, in fact seamlessly combined into a strangely ordered, yet chaotic scene. Hundreds of individuals eagerly waited a few hours…

Defensive Cyber Operations: Ground Zeroes

August 10, 2015

In an era plagued by thieves, criminals, and script kiddies, the need for securing information has increased exponentially. The market is teeming with products that are advertised to adequately secure your systems, data stores, sensitive information, etc. independently or in tandem with a bevy of other products. In the modern business world, global, interconnected networks…