runZero Hour, Ep. 15: Network topology, detailed fingerprinting and MODBUS love

On this episode of runZero Hour, Rob King and Tom Sellers welcome Brianna Cluck, researcher extraordinaire from GreyNoise Intelligence, covering a range of topics including:

  • Network topology: We go under the hood on network topology mapping and see how to spot exposures and segmentation issues. Plus, we learn about Brianna’s new research on tags with suspicious intention!
  • Fingerprinting network devices in detail: We deconstruct our updated Palo Alto probes and show you how to uncover more attributes on your network devices using creative new techniques.
  • MODBUS love: It’s the ICS protocol so popular it’s got a ton of proprietary, vendor-based extensions! Brianna shares recent research and tips for staying on top of the variations to keep your OT secure.
  • runZero updates: We've got new queries and categorizations for you, plus the ability to age out attributes to improve fingerprinting accuracy and reprocess tasks to fine tune asset data without losing history.

Meet Our Speakers

Tom Sellers

Principal Research Engineer

Rob King

Director of Applied Research, runZero

Brianna Cluck

Special Guest, GreyNoise Researcher

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Webcasts
runZero Hour, Ep. 25: The Holiday Hackstravaganza!
Tod Beardsley, Rob King, (and special guests!) look back at 2025’s wildest vulnerabilities, standout research, and make bold predictions for 2026.
Webcasts
Attack Surface Management: Continuous discovery, external attack paths
Your attack surface no longer ends at the firewall. With SaaS apps, cloud instances, IoT, and shadow IT multiplying, organizations are exposed in...
Webcasts
runZero Hour, Ep. 24: Attack graphs with runZero and BloodHound!
In this episode, runZero's Tod Beardsley, Rob King, HD Moore and Jared Atkinson, CTO of SpecterOps, dive into the tangled world of modern attack...
Webcasts
Fixing a broken system: why legacy vuln management tools can’t keep up
Watch the on-demand webcast on the future of exposure management, featuring attacker-driven strategies, continuous visibility, and rapid remediation.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.