"transparency for the powerful, privacy for the weak" – Juian Assange
[+] prometheus@c3l.lu (0xA2E6C1D6)
[+] prometheus@jabber.c3l.lu
[+] @JanGuth
[+] avernak.is
Social Engineering References
Exercises
Cyber Security Essentiels, p. 76 Local Proxies –> Put a few information sheets on the desks of XY and convince users that the named IP is the new proxy that is needed
NSE References
avernak.is