Greater London, England, United Kingdom
Contact Info
44K followers
500+ connections
About
Articles by Nathan
-
🛡️ OpenAI and Microsoft Collaboration on Cyber Threat Disruption
🛡️ OpenAI and Microsoft Collaboration on Cyber Threat Disruption
By Nathan House
Activity
-
🔐 Is CompTIA Security+ Worth It? A Must-Read Review (2024) Are you considering the CompTIA Security+ certification? We'll help you evaluate its…
🔐 Is CompTIA Security+ Worth It? A Must-Read Review (2024) Are you considering the CompTIA Security+ certification? We'll help you evaluate its…
Shared by Nathan House
-
🔑 How to Use Windows Privilege Escalation for Hacking Elevate your hacking skills with our guide on Windows privilege escalation. Learn how to…
🔑 How to Use Windows Privilege Escalation for Hacking Elevate your hacking skills with our guide on Windows privilege escalation. Learn how to…
Shared by Nathan House
-
🔍CySA+ vs. Security+: Which Certification Works Best for You? Each certification serves distinct purposes and suits different experience levels in…
🔍CySA+ vs. Security+: Which Certification Works Best for You? Each certification serves distinct purposes and suits different experience levels in…
Shared by Nathan House
Experience & Education
Licenses & Certifications
Publications
-
Cyber Security Career Talk With Nathan House – Secure Talk Podcast
https://www.stationx.net/cyber-security-career-talk-with-nathan-house-secure-talk-podcast/
-
Tor Search Engine Offers Weak SSL/TLS Ciphers
Security research - The TOR browser is now using search.disconnect.me as the default search engine. I noticed they were offering TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33) with 1024 bits Diffie-Hellman key exchange and using common primes.
-
Can Your Car Be Hacked?
The current and future trends in car automation, car hacking and what this means to vehicle security and your safety. Looking at the security of ECUs and the CAN networks.
-
Social Engineering Transcript
An example of a previous social engineering engagement I performed for a client. It demonstrates what seemed like insignificant information can build trust with people and compromise a company.
-
The Complete Cyber Security Course! : End Point Protection
Volume 4
Antivirus & Malware, Disk Encryption, Finding & Removing Hackers & Malware, Application & Execution Control
-
Firewall Test Agent (Pen Test Tool)
-
This simple tool can be used to test and log the rules on a firewall. The Firewall Test Agent is able to open up any number of TCP and UDP ports on a windows machine and log any connection attempts.
-
Gossamer Threads Links SQL login XSS Vulnerability
BUG Track ID: 13484
XSS vulnerability in Gossamer Threads Links for stealing usernames and passwords.
-
PC Extreme Magazine Interviews Nathan House on Penetration Testing
-
Ed Baldwin talks to a man on the edge of computer security.
-
Statcounter Script Injection User Session Hijack
CVE-2005-2389
This advisory identifies a vulnerability that can disclose the authentication and session information of the all registered users of statcounter. Statcounter.com is one of the best and most well known website monitoring applications on the Internet. More than 1/2 million website’s link to it according to google.
-
The Complete Cyber Security Course : Anonymous Browsing!
Volume III
This course covers Anonymous Browsing, Hide my IP, Internet Privacy, Hacker OPSEC, Tor, Proxy Servers and Best VPNs Learn a practical skill-set in in staying anonymous online and maintaining total privacy against even a well resourced adversary with global influence. Covering all major platforms including Windows, Mac OS X, Linux.
-
The Complete Cyber Security Course : Hackers Exposed!
Volume I
Learn a practical skill-set in defeating all online threats including - advanced hackers, trackers, malware, zero days, exploit kits, cyber criminals and more.
Go from a beginner to advanced in this easy to follow expert course. -
The Complete Cyber Security Course : Network Security!
Volume II
Learn an advanced practical skill-set in assuring network security against all threats including - advanced hackers, trackers, exploit kits, Wi-Fi attacks and much more.
-
Windows Permission Identifier (Pen Test Tool)
-
This tool enables administrators and penetration testers to review and audit the permissions of users on a Windows machine.
More activity by Nathan
-
🕵️ How to Use BloodHound to Hack Active Directory: A Full Guide Unlock BloodHound's potential to exploit vulnerabilities in Windows Active…
🕵️ How to Use BloodHound to Hack Active Directory: A Full Guide Unlock BloodHound's potential to exploit vulnerabilities in Windows Active…
Shared by Nathan House
-
🛡️SSCP vs Security+: Which Is the Right Certification for You? Both offer a strong foundation for cyber security careers but cater to different…
🛡️SSCP vs Security+: Which Is the Right Certification for You? Both offer a strong foundation for cyber security careers but cater to different…
Shared by Nathan House
-
🛡️ Penetration Testing Steps: A Comprehensive Guide Understanding and following the right steps in penetration testing is key to uncovering…
🛡️ Penetration Testing Steps: A Comprehensive Guide Understanding and following the right steps in penetration testing is key to uncovering…
Shared by Nathan House
-
🔍 How to Become a Penetration Tester: 2024 Guide Have you ever considered a career in penetration testing? It's exciting, in demand, and pays well.…
🔍 How to Become a Penetration Tester: 2024 Guide Have you ever considered a career in penetration testing? It's exciting, in demand, and pays well.…
Shared by Nathan House
-
Get the three-digit key... https://lnkd.in/eNuDS3wJ
Get the three-digit key... https://lnkd.in/eNuDS3wJ
Shared by Nathan House
-
🔴🔵 Red Team vs Blue Team: Which Is the Best Choice for You? Understand their distinct functions: Red teams simulate attacks to find security gaps,…
🔴🔵 Red Team vs Blue Team: Which Is the Best Choice for You? Understand their distinct functions: Red teams simulate attacks to find security gaps,…
Shared by Nathan House
-
🔒 Is Hacking Illegal? The Law and Ethical Perspectives Is hacking always illegal? Not exactly. It depends on factors like intent, authorization…
🔒 Is Hacking Illegal? The Law and Ethical Perspectives Is hacking always illegal? Not exactly. It depends on factors like intent, authorization…
Shared by Nathan House
-
7 Things Hackers Use IP Address For: https://lnkd.in/eeBcErzA
7 Things Hackers Use IP Address For: https://lnkd.in/eeBcErzA
Shared by Nathan House
-
🔥How to Perform Kerberoasting Attacks: The Ultimate Guide Kerberoasting is a game-changer in the world of hacking. It allows the takeover of…
🔥How to Perform Kerberoasting Attacks: The Ultimate Guide Kerberoasting is a game-changer in the world of hacking. It allows the takeover of…
Shared by Nathan House
-
🎧 The Best Cyber Security Podcasts for You in 2024 Are you on the hunt for engaging cybersecurity podcasts to boost your knowledge on the go? We’ve…
🎧 The Best Cyber Security Podcasts for You in 2024 Are you on the hunt for engaging cybersecurity podcasts to boost your knowledge on the go? We’ve…
Shared by Nathan House
-
🚀 How to Install Kali Linux on Raspberry Pi (And Why Do It?) Ever wondered if you can turn your Raspberry Pi into a powerful hacking tool? Yes…
🚀 How to Install Kali Linux on Raspberry Pi (And Why Do It?) Ever wondered if you can turn your Raspberry Pi into a powerful hacking tool? Yes…
Shared by Nathan House
-
🚀 **Mastering the Nmap Scripting Engine: Unleash Its Full Potential** Nmap's Scripting Engine (NSE) is a game-changer for network scanning and…
🚀 **Mastering the Nmap Scripting Engine: Unleash Its Full Potential** Nmap's Scripting Engine (NSE) is a game-changer for network scanning and…
Shared by Nathan House
-
🌐 How to Use the BeEF Hacking Tool (2024) Unlock the potential of the BeEF hacking tool with our comprehensive guide. We'll take you through…
🌐 How to Use the BeEF Hacking Tool (2024) Unlock the potential of the BeEF hacking tool with our comprehensive guide. We'll take you through…
Shared by Nathan House
-
🔑 Linux Privilege Escalation Techniques for Hacking This comprehensive guide delves into Linux privilege escalation techniques, essential for…
🔑 Linux Privilege Escalation Techniques for Hacking This comprehensive guide delves into Linux privilege escalation techniques, essential for…
Shared by Nathan House
-
🔓 How to Use Hydra to Crack Passwords: The Complete Guide Unlike offline crackers like John the Ripper, Hydra shines in testing online…
🔓 How to Use Hydra to Crack Passwords: The Complete Guide Unlike offline crackers like John the Ripper, Hydra shines in testing online…
Shared by Nathan House
-
🌐 OWASP Top 10 for WebApp Penetration Testing Unlock web application security essentials with our OWASP penetration testing guide. We cover key…
🌐 OWASP Top 10 for WebApp Penetration Testing Unlock web application security essentials with our OWASP penetration testing guide. We cover key…
Shared by Nathan House
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Nathan House
-
Nathan House
President at The House Company
-
Nathan House
-
Nathan House
Forester | Maryland Forest Service
-
Nathan House
Integrated Construction Manager at Mortenson
70 others named Nathan House are on LinkedIn
See others named Nathan House