• Skip to content
Cyber Reboot
  • cyberreboot-logo@2×480
  • Projects
  • About
  • Contact
  • Blog
  •       

Home

  • REIMAGINING CYBER DEFENSE
    Increasing the cost and complexity for our adversaries while reducing it for our defenders.

The Cyber Attack Chain

The lifecycle of most cyber attacks can be categorized into three distinct phases.
Cyber Reboot currently focuses on the last: Post-compromise.

Pre-compromise

An attacker is tasked with a target and objective, deploys attack infrastructure, and begins to perform reconnaissance of the target.

Compromise

The attack is executed, breaching the target’s defenses and establishing a foothold in the network. The attacker then sets up communication mechanisms back to the attack infrastructure.

Post-compromise

Further exploration of the internal network occurs to identify and access specific information or target systems, collect data, and exfiltrate or otherwise accomplish the objective.

What We’re Working On

SEE ALL PROJECTS
  • Poseidon
    A Python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to machine learning techniques.
    SEE DETAILS
  • CRviz
    Browser-based visualization tool that uses JSON and an interactive enclosure diagram to visualize networks.
    SEE DETAILS
  • Vent
    Vent is a light-weight tool, built on a plugin system, that lets you easily leverage Docker containers by building customizable and repeatable pipelines in minutes for collection and analysis.
    SEE DETAILS
  • Pcapplot
    Provides a quick visual "thumbnail" snapshot of a network packet capture (PCAP file) from the perspective of a single host/device, generating thumbnails of four distinct properties.
    SEE DETAILS
_cyberreboot avatar
8 Feb

Want to see how using PKI and x.509 certificates can be made easier in #python? Check out our newest blog! https://t.co/EyiQ1cs2EU

_cyberreboot avatar
25 Jan

Happy Friday, and new release day! Find the latest Poseidon and Vent releases here: https://t.co/RDVbfoEYg0, https://t.co/06TodZsnGJ

_cyberreboot avatar
6 Nov

Great post from @esnet regarding Faucet - Enterprise SDN from an office to multi-terabit SCinet at #SC18 https://t.co/7vCLpk8Wmy

_cyberreboot avatar
1 Oct

#Hacktoberfest is here! Learn more about how #CyberReboot is contributing to open source projects https://t.co/BfA3owDAih

_cyberreboot avatar
21 Sep

Happy Friday! Check out our latest releases of PoseidonML https://t.co/mTcGPbXGOn and Vent https://t.co/Znu1GuzEGP!

From Our Blog

SEE ALL BLOG POSTS

Using PKCS#12 formatted certificates in Python

Using certificates from python can be a challenging and counterintuitive process, and the default options available to developers are somewhat limited. This blog explores enhance the open source Requests Toolbelt library.

READ MORE

Cyber Reboot Kicks off Hacktoberfest

Hacktoberfest — which takes place throughout the month of October — has become an exciting time of the year for open source software. Last year we were happy to report a very successful Hacktoberfest turnout where we contributed to 85 different projects and attracted 33 new contributors to our projects. This year we hope to continue that trend.

READ MORE
  • IQT Labs Logo – White
  • Projects
  • About
  • Contact
  • Blog
  • Terms of Use
  • Privacy Policy
  • Copyright © 2019 IQT Labs LLC | IQT Labs is a wholly owned subsidiary of In-Q-Tel, Inc.