Note: This is the first post of a two parts series on how to use IDS in a different way.
Intrusion Detection Systems such as Snort and Suricata
are traditionally seen as Defensive tools, and in essence they are. They can alert on security issues occurring on your network such as Botnet Activities, network based attacks, hosts/servers activities and vulnerabilities.
That last point is important.
It is important because that same information used for defence activities, could be used by an attacker as part of an attack reconnaissance. For example, being able to identify a list of hosts that use outdated SSH/SSL servers, a vulnerable Flash Client or other vulnerable software/services; HTTP logs highlighting users web activities, clear text passwords, etc.
When looking at an IDS that way, it becomes a passi...
>>[READ MORE]

IDS used as an Offensive Security Tool
Securing your Cloud Storage with a Boxcryptor alternative called EncFS
How to reduce WEB 2.0 attack surface by going back to WEB 1.0, the dynamic way!
Website update
BlackHat Mobile Security Summit - London 2015
Hackfu2015 Challenge 7 - Solution
One more update to the Security Onion Guide