This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision |
| user:prometheus [2014/06/02 01:38] – prometheus | user:prometheus [2016/07/27 18:03] (current) – prometheus |
|---|
| "transparency for the powerful, privacy for the weak" -- Juian Assange// | "transparency for the powerful, privacy for the weak" -- Juian Assange// |
| |
| | [+] prometheus@c3l.lu ([[http://keyserver.c3l.lu:11371/pks/lookup?search=0xA2E6C1D6&op=vindex|0xA2E6C1D6]]) |
| | |
| [+] prometheus@c3l.lu ([[https://gpg.c3l.lu/pks/lookup?op=get&search=0x91B5210D608C44D6]|0x608C44D6]]) | |
| |
| [+] prometheus@jabber.c3l.lu | [+] prometheus@jabber.c3l.lu |
| * [[http://isbndb.com/d/book/the_art_of_deception_a01.html|The Art of Deception]] by Kevin D. Mitnick & William L. Simon | * [[http://isbndb.com/d/book/the_art_of_deception_a01.html|The Art of Deception]] by Kevin D. Mitnick & William L. Simon |
| * [[http://isbndb.com/d/book/the_art_of_intrusion.html|The Art of Intrusion]] by Kevin D. Mitnick & William L. Simon | * [[http://isbndb.com/d/book/the_art_of_intrusion.html|The Art of Intrusion]] by Kevin D. Mitnick & William L. Simon |
| | |
| | __Exercises__ |
| | |
| | Cyber Security Essentiels, p. 76 |
| | Local Proxies --> Put a few information sheets on the desks of XY and convince users that the named IP is the new proxy that is needed |
| |
| __NSE References__ | __NSE References__ |
| * [[http://nmap.org/book/nse.html|Nmap Scripting Engine]] (Manual) | * [[http://nmap.org/book/nse.html|Nmap Scripting Engine]] (Manual) |
| * [[http://thesprawl.org/research/writing-nse-scripts-for-vulnerability-scanning/|writing nmap nse scripts for vulnerability scanning]] | * [[http://thesprawl.org/research/writing-nse-scripts-for-vulnerability-scanning/|writing nmap nse scripts for vulnerability scanning]] |
| | |
| | __avernak.is__ |
| | |
| | {{rss>http://avernak.is/feed/atom/ 5 author date 1h }} |