user:prometheus

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revisionBoth sides next revision
user:prometheus [2012/11/13 00:38] prometheususer:prometheus [2016/07/27 18:02] prometheus
Line 1: Line 1:
 ====== prometheus ====== ====== prometheus ======
 +//
 +"transparency for the powerful, privacy for the weak" -- Juian Assange//
  
 +[+] prometheus@c3l.lu ([[http://keyserver.c3l.lu:11371/pks/lookup?search=0xA2E6C1D6&op=vindex|0xA2E6C1D6]])
  
 +[+] prometheus@jabber.c3l.lu
  
-[+] prometheus<del>@</del>c3l.lu ([[https://gpg.c3l.lu/pks/lookup?op=get&search=0x91B5210D608C44D6]|0x608C44D6]])+[+] [[https://twitter.com/JanGuth|@JanGuth]]
  
-[+] prometheus<del>@</del>jabber.c3l.lu+[+] [[http://avernak.is|avernak.is]] 
 + 
 +__Social Engineering References__ 
 + 
 +  * [[http://isbndb.com/d/book/social_engineering_a02.html|Social Engineering: The Art of Human Hacking]] by Paul Wilson 
 +  * [[http://isbndb.com/d/book/the_art_of_deception_a01.html|The Art of Deception]] by Kevin D. Mitnick & William L. Simon 
 +  * [[http://isbndb.com/d/book/the_art_of_intrusion.html|The Art of Intrusion]] by Kevin D. Mitnick & William L. Simon 
 + 
 +__Exercises__ 
 + 
 +Cyber Security Essentiels, p. 76 
 +Local Proxies --Put a few information sheets on the desks of XY and convince users that the named IP is the new proxy that is needed 
 + 
 +__NSE References__ 
 + 
 +  * [[http://nmap.org/book/nse.html|Nmap Scripting Engine]] (Manual) 
 +  * [[http://thesprawl.org/research/writing-nse-scripts-for-vulnerability-scanning/|writing nmap nse scripts for vulnerability scanning]] 
 + 
 +__avernak.is__ 
 + 
 +{{rss>http://avernak.is/feed/atom/ 5 author date 1h }} 
 + 
 +{{:user:archive.zip|}}
  • user/prometheus.txt
  • Last modified: 2016/07/27 18:03
  • by prometheus