<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://hack3rs.ca/</loc></url><url><loc>https://hack3rs.ca/400/</loc></url><url><loc>https://hack3rs.ca/401/</loc></url><url><loc>https://hack3rs.ca/403/</loc></url><url><loc>https://hack3rs.ca/405/</loc></url><url><loc>https://hack3rs.ca/408/</loc></url><url><loc>https://hack3rs.ca/410/</loc></url><url><loc>https://hack3rs.ca/418/</loc></url><url><loc>https://hack3rs.ca/429/</loc></url><url><loc>https://hack3rs.ca/502/</loc></url><url><loc>https://hack3rs.ca/503/</loc></url><url><loc>https://hack3rs.ca/504/</loc></url><url><loc>https://hack3rs.ca/about/</loc></url><url><loc>https://hack3rs.ca/blog/</loc></url><url><loc>https://hack3rs.ca/blog/2024-03-tax-season-phishing-and-credential-harvesting-defense/</loc></url><url><loc>https://hack3rs.ca/blog/2024-04-internet-facing-edge-audit-and-kev-prioritization/</loc></url><url><loc>https://hack3rs.ca/blog/2024-05-ransomware-pre-positioning-signals-before-encryption/</loc></url><url><loc>https://hack3rs.ca/blog/2024-06-cloud-identity-drift-and-control-plane-visibility/</loc></url><url><loc>https://hack3rs.ca/blog/2024-07-public-wifi-travel-season-vpn-and-wireless-defense-basics/</loc></url><url><loc>https://hack3rs.ca/blog/2024-08-dns-anomaly-hunting-for-quiet-command-and-control/</loc></url><url><loc>https://hack3rs.ca/blog/2024-09-segmentation-and-ddos-readiness-for-high-traffic-seasons/</loc></url><url><loc>https://hack3rs.ca/blog/2024-10-phishing-resistant-mfa-and-identity-hardening-month/</loc></url><url><loc>https://hack3rs.ca/blog/2024-11-holiday-commerce-surface-hardening-and-web-telemetry-review/</loc></url><url><loc>https://hack3rs.ca/blog/2024-12-backup-restore-validation-and-year-end-response-drills/</loc></url><url><loc>https://hack3rs.ca/blog/2025-01-kev-prioritization-reset-for-the-new-year/</loc></url><url><loc>https://hack3rs.ca/blog/2025-02-business-email-compromise-session-theft-and-mailbox-abuse/</loc></url><url><loc>https://hack3rs.ca/blog/2025-03-vpn-rdp-exposure-drift-and-remote-access-validation/</loc></url><url><loc>https://hack3rs.ca/blog/2025-04-attack-mapping-lateral-movement-detections-that-actually-help/</loc></url><url><loc>https://hack3rs.ca/blog/2025-05-supply-chain-trust-paths-and-vendor-remote-access-oversight/</loc></url><url><loc>https://hack3rs.ca/blog/2025-06-zeek-and-suricata-tuning-for-noisy-environments/</loc></url><url><loc>https://hack3rs.ca/blog/2025-07-wireless-rogue-ap-drills-and-byod-segmentation-validation/</loc></url><url><loc>https://hack3rs.ca/blog/2025-08-packet-analysis-case-study-dns-tls-http-triage/</loc></url><url><loc>https://hack3rs.ca/blog/2025-09-ad-privilege-path-review-and-defensive-bloodhound-usage/</loc></url><url><loc>https://hack3rs.ca/blog/2025-10-dns-tunneling-detection-baselines-for-awareness-month/</loc></url><url><loc>https://hack3rs.ca/blog/2025-11-ddos-runbook-testing-and-dependency-mapping-before-peak-load/</loc></url><url><loc>https://hack3rs.ca/blog/2025-12-post-incident-review-hardening-backlog-that-actually-gets-done/</loc></url><url><loc>https://hack3rs.ca/blog/2026-01-cloud-identity-abuse-prevention-roadmap-for-new-year-projects/</loc></url><url><loc>https://hack3rs.ca/blog/2026-02-insider-threat-monitoring-and-access-review-discipline/</loc></url><url><loc>https://hack3rs.ca/canada/</loc></url><url><loc>https://hack3rs.ca/canada/cybersecurity-internships-students-fswp-coop/</loc></url><url><loc>https://hack3rs.ca/canada/cybersecurity-schools-and-programs/</loc></url><url><loc>https://hack3rs.ca/canada/entry-level-network-security-roadmap/</loc></url><url><loc>https://hack3rs.ca/canada/home-lab-guide/</loc></url><url><loc>https://hack3rs.ca/canada/network-security-learning-path/</loc></url><url><loc>https://hack3rs.ca/comparisons/</loc></url><url><loc>https://hack3rs.ca/comparisons/nmap-vs-masscan-defensive-use/</loc></url><url><loc>https://hack3rs.ca/comparisons/openvas-greenbone-vs-nessus-concepts/</loc></url><url><loc>https://hack3rs.ca/comparisons/security-onion-vs-diy-blue-team-stack/</loc></url><url><loc>https://hack3rs.ca/comparisons/siem-vs-ids-vs-edr-vs-ndr/</loc></url><url><loc>https://hack3rs.ca/comparisons/wireshark-vs-tcpdump-vs-tshark/</loc></url><url><loc>https://hack3rs.ca/comparisons/zeek-vs-suricata-vs-snort/</loc></url><url><loc>https://hack3rs.ca/contact/</loc></url><url><loc>https://hack3rs.ca/cyber-careers/</loc></url><url><loc>https://hack3rs.ca/editorial-policy/</loc></url><url><loc>https://hack3rs.ca/errors/</loc></url><url><loc>https://hack3rs.ca/how-content-is-maintained/</loc></url><url><loc>https://hack3rs.ca/how-to-use-this-site-safely/</loc></url><url><loc>https://hack3rs.ca/labs/</loc></url><url><loc>https://hack3rs.ca/labs/dns-triage-beginner/</loc></url><url><loc>https://hack3rs.ca/labs/exposure-audit-nmap-ndiff/</loc></url><url><loc>https://hack3rs.ca/labs/pcap-http-tls-investigation/</loc></url><url><loc>https://hack3rs.ca/labs/phishing-triage-identity-workflow/</loc></url><url><loc>https://hack3rs.ca/labs/wireless-rogue-ap-detection-drill/</loc></url><url><loc>https://hack3rs.ca/learning/</loc></url><url><loc>https://hack3rs.ca/learning/alert-triage-false-positives-detection-tuning/</loc></url><url><loc>https://hack3rs.ca/learning/exploit-informed-remediation-and-asset-criticality-tagging/</loc></url><url><loc>https://hack3rs.ca/learning/frameworks/</loc></url><url><loc>https://hack3rs.ca/learning/frameworks/baseline-controls-small-medium-teams/</loc></url><url><loc>https://hack3rs.ca/learning/frameworks/kev-prioritization/</loc></url><url><loc>https://hack3rs.ca/learning/frameworks/mitre-attack-detection-gap-mapping/</loc></url><url><loc>https://hack3rs.ca/learning/frameworks/nist-csf-governance-operations/</loc></url><url><loc>https://hack3rs.ca/learning/frameworks/vendor-community-docs-workflow-learning/</loc></url><url><loc>https://hack3rs.ca/learning/incident-response-playbooks-framework-functions/</loc></url><url><loc>https://hack3rs.ca/learning/linux-windows-logging-basics-for-defenders/</loc></url><url><loc>https://hack3rs.ca/learning/network-security-monitoring-zeek-suricata/</loc></url><url><loc>https://hack3rs.ca/learning/nmap-scanning-strategy-safe-validation-workflows/</loc></url><url><loc>https://hack3rs.ca/learning/openvas-greenbone-credentialed-vs-unauthenticated-scans/</loc></url><url><loc>https://hack3rs.ca/learning/packet-capture-protocol-analysis-wireshark-tshark/</loc></url><url><loc>https://hack3rs.ca/learning/post-incident-review-hardening-backlog-detection-coverage-gaps/</loc></url><url><loc>https://hack3rs.ca/learning/subnetting-nat-firewall-policy-segmentation/</loc></url><url><loc>https://hack3rs.ca/learning/tcp-ip-dns-http-tls-routing-switching/</loc></url><url><loc>https://hack3rs.ca/learning/threat-informed-defense-attack-technique-mapping/</loc></url><url><loc>https://hack3rs.ca/learning/tools/</loc></url><url><loc>https://hack3rs.ca/learning/tools/aircrack-ng/</loc></url><url><loc>https://hack3rs.ca/learning/tools/airgeddon/</loc></url><url><loc>https://hack3rs.ca/learning/tools/arkime/</loc></url><url><loc>https://hack3rs.ca/learning/tools/armitage/</loc></url><url><loc>https://hack3rs.ca/learning/tools/arp-scan/</loc></url><url><loc>https://hack3rs.ca/learning/tools/arpwatch/</loc></url><url><loc>https://hack3rs.ca/learning/tools/autopsy/</loc></url><url><loc>https://hack3rs.ca/learning/tools/bettercap/</loc></url><url><loc>https://hack3rs.ca/learning/tools/bloodhound/</loc></url><url><loc>https://hack3rs.ca/learning/tools/burpsuite/</loc></url><url><loc>https://hack3rs.ca/learning/tools/cadaver/</loc></url><url><loc>https://hack3rs.ca/learning/tools/cain-and-abel/</loc></url><url><loc>https://hack3rs.ca/learning/tools/crackmapexec/</loc></url><url><loc>https://hack3rs.ca/learning/tools/dirbuster/</loc></url><url><loc>https://hack3rs.ca/learning/tools/dnschef-lab/</loc></url><url><loc>https://hack3rs.ca/learning/tools/dnschef/</loc></url><url><loc>https://hack3rs.ca/learning/tools/dnsenum/</loc></url><url><loc>https://hack3rs.ca/learning/tools/dnsrecon/</loc></url><url><loc>https://hack3rs.ca/learning/tools/emailharvester/</loc></url><url><loc>https://hack3rs.ca/learning/tools/ettercap/</loc></url><url><loc>https://hack3rs.ca/learning/tools/evil-winrm/</loc></url><url><loc>https://hack3rs.ca/learning/tools/fern-wifi-cracker/</loc></url><url><loc>https://hack3rs.ca/learning/tools/ffuf/</loc></url><url><loc>https://hack3rs.ca/learning/tools/hashcat/</loc></url><url><loc>https://hack3rs.ca/learning/tools/hping3/</loc></url><url><loc>https://hack3rs.ca/learning/tools/hydra/</loc></url><url><loc>https://hack3rs.ca/learning/tools/john-the-ripper/</loc></url><url><loc>https://hack3rs.ca/learning/tools/johnny-legacy-note/</loc></url><url><loc>https://hack3rs.ca/learning/tools/kismet/</loc></url><url><loc>https://hack3rs.ca/learning/tools/maltego/</loc></url><url><loc>https://hack3rs.ca/learning/tools/masscan-note/</loc></url><url><loc>https://hack3rs.ca/learning/tools/medusa/</loc></url><url><loc>https://hack3rs.ca/learning/tools/metasploit/</loc></url><url><loc>https://hack3rs.ca/learning/tools/mitm6/</loc></url><url><loc>https://hack3rs.ca/learning/tools/ncat/</loc></url><url><loc>https://hack3rs.ca/learning/tools/ncrack/</loc></url><url><loc>https://hack3rs.ca/learning/tools/ndiff/</loc></url><url><loc>https://hack3rs.ca/learning/tools/netcat-traditional/</loc></url><url><loc>https://hack3rs.ca/learning/tools/netdiscover/</loc></url><url><loc>https://hack3rs.ca/learning/tools/nikto/</loc></url><url><loc>https://hack3rs.ca/learning/tools/nmap/</loc></url><url><loc>https://hack3rs.ca/learning/tools/nping/</loc></url><url><loc>https://hack3rs.ca/learning/tools/openvas-greenbone-ce/</loc></url><url><loc>https://hack3rs.ca/learning/tools/osquery/</loc></url><url><loc>https://hack3rs.ca/learning/tools/owasp-zap/</loc></url><url><loc>https://hack3rs.ca/learning/tools/paths/</loc></url><url><loc>https://hack3rs.ca/learning/tools/pingcastle/</loc></url><url><loc>https://hack3rs.ca/learning/tools/recon-ng/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/architecture-diagram-updates/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/asset-inventory-cmdb/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/asset-inventory-spreadsheet-cmdb/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/att-ck-navigator/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/case-management-ticketing/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/case-management/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/change-calendar/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/cmdb-asset-inventory/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/comms-templates/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/credential-vaulting/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/curl/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/detection-as-code-repos/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/detection-change-log/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/detection-repository/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/dig-nslookup/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/endpoint-logs/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/evidence-collection-checklists/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/firewall-policy-simulators/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/incident-timeline-template/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/ipcalc/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/journalctl/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/log-pipeline-siem/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/network-diagrams/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/patch-management-dashboards/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/patch-management-tools/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/pcap-validation-tools/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/pfsense-opnsense-lab/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/post-incident-review-template/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/purple-team-test-plans/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/risk-register/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/router-cli-cloud-route-tables/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/rsyslog-syslog-ng/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/runbook-repository/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/siem-alerting-platform/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/siem/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/sysmon/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/tabletop-exercise-worksheets/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/ticketing-and-sla-tracking/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/ticketing-backlog-board/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/ticketing-system/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/vulnerability-scanner-outputs/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/windows-event-forwarding/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/windows-event-viewer/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/zeek-suricata-endpoint-telemetry/</loc></url><url><loc>https://hack3rs.ca/learning/tools/reference/zeek-suricata-logs/</loc></url><url><loc>https://hack3rs.ca/learning/tools/sara/</loc></url><url><loc>https://hack3rs.ca/learning/tools/security-onion/</loc></url><url><loc>https://hack3rs.ca/learning/tools/sharphound/</loc></url><url><loc>https://hack3rs.ca/learning/tools/sigma/</loc></url><url><loc>https://hack3rs.ca/learning/tools/snort/</loc></url><url><loc>https://hack3rs.ca/learning/tools/socat/</loc></url><url><loc>https://hack3rs.ca/learning/tools/spiderfoot/</loc></url><url><loc>https://hack3rs.ca/learning/tools/sqlmap/</loc></url><url><loc>https://hack3rs.ca/learning/tools/sqlninja/</loc></url><url><loc>https://hack3rs.ca/learning/tools/steghide/</loc></url><url><loc>https://hack3rs.ca/learning/tools/stegosuite/</loc></url><url><loc>https://hack3rs.ca/learning/tools/strings/</loc></url><url><loc>https://hack3rs.ca/learning/tools/suricata/</loc></url><url><loc>https://hack3rs.ca/learning/tools/tcpdump/</loc></url><url><loc>https://hack3rs.ca/learning/tools/theharvester/</loc></url><url><loc>https://hack3rs.ca/learning/tools/velociraptor/</loc></url><url><loc>https://hack3rs.ca/learning/tools/wazuh/</loc></url><url><loc>https://hack3rs.ca/learning/tools/websploit/</loc></url><url><loc>https://hack3rs.ca/learning/tools/wifiphisher/</loc></url><url><loc>https://hack3rs.ca/learning/tools/wifite/</loc></url><url><loc>https://hack3rs.ca/learning/tools/wireshark-tshark/</loc></url><url><loc>https://hack3rs.ca/learning/tools/yara/</loc></url><url><loc>https://hack3rs.ca/learning/tools/zeek/</loc></url><url><loc>https://hack3rs.ca/netsec-certifications/</loc></url><url><loc>https://hack3rs.ca/network-security-faq/</loc></url><url><loc>https://hack3rs.ca/security-conferences/</loc></url><url><loc>https://hack3rs.ca/sources-and-references-policy/</loc></url><url><loc>https://hack3rs.ca/threats/</loc></url><url><loc>https://hack3rs.ca/threats/cloud-misconfiguration-and-identity-abuse/</loc></url><url><loc>https://hack3rs.ca/threats/ddos-and-service-exhaustion-attacks/</loc></url><url><loc>https://hack3rs.ca/threats/dns-abuse-tunneling-and-command-control/</loc></url><url><loc>https://hack3rs.ca/threats/exposed-services-and-remote-access-weaknesses/</loc></url><url><loc>https://hack3rs.ca/threats/insider-threat-and-privilege-misuse/</loc></url><url><loc>https://hack3rs.ca/threats/lateral-movement-after-initial-access/</loc></url><url><loc>https://hack3rs.ca/threats/phishing-and-credential-theft/</loc></url><url><loc>https://hack3rs.ca/threats/ransomware-and-data-extortion-operations/</loc></url><url><loc>https://hack3rs.ca/threats/state-backed-and-foreign-targeted-intrusions/</loc></url><url><loc>https://hack3rs.ca/threats/supply-chain-and-third-party-compromise/</loc></url><url><loc>https://hack3rs.ca/threats/vulnerability-exploitation-and-misconfiguration-abuse/</loc></url><url><loc>https://hack3rs.ca/threats/wireless-rogue-access-and-evil-twin-attacks/</loc></url><url><loc>https://hack3rs.ca/trust/</loc></url></urlset>