Greater London, England, United Kingdom
Contact Info
46K followers
500+ connections
About
Services
Articles by Nathan
Activity
-
🔐 How to Become a Cyber Security Analyst (2024) 🎒 We cover the job role, essential skills, training routes, and required certifications. Discover…
🔐 How to Become a Cyber Security Analyst (2024) 🎒 We cover the job role, essential skills, training routes, and required certifications. Discover…
Shared by Nathan House
-
🚨 RAMBO Attack: Stealing Data from Air-Gapped Computers 🚨 🛡️ Discover how the 'Rambo Attack' uses electromagnetic radiation from RAM to steal data…
🚨 RAMBO Attack: Stealing Data from Air-Gapped Computers 🚨 🛡️ Discover how the 'Rambo Attack' uses electromagnetic radiation from RAM to steal data…
Shared by Nathan House
-
🔮 What Is a Cyber Security Purple Team? 🔑 This guide explains the Purple Team's roles, responsibilities, and benefits. ☀️ It highlights the…
🔮 What Is a Cyber Security Purple Team? 🔑 This guide explains the Purple Team's roles, responsibilities, and benefits. ☀️ It highlights the…
Shared by Nathan House
Experience & Education
Licenses & Certifications
Publications
-
Cyber Security Career Talk With Nathan House – Secure Talk Podcast
https://www.stationx.net/cyber-security-career-talk-with-nathan-house-secure-talk-podcast/
-
Tor Search Engine Offers Weak SSL/TLS Ciphers
Security research - The TOR browser is now using search.disconnect.me as the default search engine. I noticed they were offering TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33) with 1024 bits Diffie-Hellman key exchange and using common primes.
-
Can Your Car Be Hacked?
The current and future trends in car automation, car hacking and what this means to vehicle security and your safety. Looking at the security of ECUs and the CAN networks.
-
Social Engineering Transcript
An example of a previous social engineering engagement I performed for a client. It demonstrates what seemed like insignificant information can build trust with people and compromise a company.
-
The Complete Cyber Security Course! : End Point Protection
Volume 4
Antivirus & Malware, Disk Encryption, Finding & Removing Hackers & Malware, Application & Execution Control
-
Firewall Test Agent (Pen Test Tool)
-
This simple tool can be used to test and log the rules on a firewall. The Firewall Test Agent is able to open up any number of TCP and UDP ports on a windows machine and log any connection attempts.
-
Gossamer Threads Links SQL login XSS Vulnerability
BUG Track ID: 13484
XSS vulnerability in Gossamer Threads Links for stealing usernames and passwords.
-
PC Extreme Magazine Interviews Nathan House on Penetration Testing
-
Ed Baldwin talks to a man on the edge of computer security.
-
Statcounter Script Injection User Session Hijack
CVE-2005-2389
This advisory identifies a vulnerability that can disclose the authentication and session information of the all registered users of statcounter. Statcounter.com is one of the best and most well known website monitoring applications on the Internet. More than 1/2 million website’s link to it according to google.
-
The Complete Cyber Security Course : Anonymous Browsing!
Volume III
This course covers Anonymous Browsing, Hide my IP, Internet Privacy, Hacker OPSEC, Tor, Proxy Servers and Best VPNs Learn a practical skill-set in in staying anonymous online and maintaining total privacy against even a well resourced adversary with global influence. Covering all major platforms including Windows, Mac OS X, Linux.
-
The Complete Cyber Security Course : Hackers Exposed!
Volume I
Learn a practical skill-set in defeating all online threats including - advanced hackers, trackers, malware, zero days, exploit kits, cyber criminals and more.
Go from a beginner to advanced in this easy to follow expert course. -
The Complete Cyber Security Course : Network Security!
Volume II
Learn an advanced practical skill-set in assuring network security against all threats including - advanced hackers, trackers, exploit kits, Wi-Fi attacks and much more.
-
Windows Permission Identifier (Pen Test Tool)
-
This tool enables administrators and penetration testers to review and audit the permissions of users on a Windows machine.
More activity by Nathan
-
🔍 CEH Certification Requirements: Everything You Need 🔑 This guide demystifies the prerequisites, explaining two paths to qualify for the CEH exam.…
🔍 CEH Certification Requirements: Everything You Need 🔑 This guide demystifies the prerequisites, explaining two paths to qualify for the CEH exam.…
Shared by Nathan House
-
🔓 CrackMapExec Cheat Sheet 2024 (Commands & Examples) 🏆 This cheat sheet provides a detailed guide on installing and effectively utilizing…
🔓 CrackMapExec Cheat Sheet 2024 (Commands & Examples) 🏆 This cheat sheet provides a detailed guide on installing and effectively utilizing…
Shared by Nathan House
-
🔍 How to Guess a Password: Your 2024 Guide ▶️ This article explores the Authentication Principle, focusing on passwords as a security element. 💡 It…
🔍 How to Guess a Password: Your 2024 Guide ▶️ This article explores the Authentication Principle, focusing on passwords as a security element. 💡 It…
Shared by Nathan House
-
🕵️ What Is Steganography? How to Hide Data Like a Spy 🎯 Steganography is a covert method for hiding data within other data, such as text, images…
🕵️ What Is Steganography? How to Hide Data Like a Spy 🎯 Steganography is a covert method for hiding data within other data, such as text, images…
Shared by Nathan House
-
📝 Best Penetration Tester Resume 2024 (Templates & Examples) 🔑 This guide helps you understand the essential elements, like certifications…
📝 Best Penetration Tester Resume 2024 (Templates & Examples) 🔑 This guide helps you understand the essential elements, like certifications…
Shared by Nathan House
-
🕵️♂️ What Is a White Hat Hacker? A Deep Dive ✍️ This article covers what white hat hackers do, the skills and certifications needed to become one…
🕵️♂️ What Is a White Hat Hacker? A Deep Dive ✍️ This article covers what white hat hackers do, the skills and certifications needed to become one…
Shared by Nathan House
-
🔐 10 Top Places to Practice Ethical Hacking on Your Own 🔎 Discover the best environments for sharpening your penetration testing abilities. 🎒…
🔐 10 Top Places to Practice Ethical Hacking on Your Own 🔎 Discover the best environments for sharpening your penetration testing abilities. 🎒…
Shared by Nathan House
Other similar profiles
-
Chris Woods
Connect -
Shah Sheikh
Connect -
Jonny Pelter
Partner @ CyPro | Cyber security driving business growth
Connect -
Shane M.
Security consultant
Connect -
Eugene Tsyrklevich
Connect -
Dr. James Kent
Connect -
Chris Burtenshaw
Better cyber outcomes with data and relentless automation 🤖
Connect -
Norman Shaw
President & Founder at ExactTrak Ltd
Connect -
George Patsis
Connect -
Devang Gandhi
Connect
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More