user:prometheus

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
user:prometheus [2012/11/13 00:38] prometheususer:prometheus [2016/07/27 18:03] (current) prometheus
Line 1: Line 1:
 ====== prometheus ====== ====== prometheus ======
 +//
 +"transparency for the powerful, privacy for the weak" -- Juian Assange//
  
 +[+] prometheus@c3l.lu ([[http://keyserver.c3l.lu:11371/pks/lookup?search=0xA2E6C1D6&op=vindex|0xA2E6C1D6]])
  
 +[+] prometheus@jabber.c3l.lu
  
-[+] prometheus<del>@</del>c3l.lu ([[https://gpg.c3l.lu/pks/lookup?op=get&search=0x91B5210D608C44D6]|0x608C44D6]])+[+] [[https://twitter.com/JanGuth|@JanGuth]]
  
-[+] prometheus<del>@</del>jabber.c3l.lu+[+] [[http://avernak.is|avernak.is]] 
 + 
 +__Social Engineering References__ 
 + 
 +  * [[http://isbndb.com/d/book/social_engineering_a02.html|Social Engineering: The Art of Human Hacking]] by Paul Wilson 
 +  * [[http://isbndb.com/d/book/the_art_of_deception_a01.html|The Art of Deception]] by Kevin D. Mitnick & William L. Simon 
 +  * [[http://isbndb.com/d/book/the_art_of_intrusion.html|The Art of Intrusion]] by Kevin D. Mitnick & William L. Simon 
 + 
 +__Exercises__ 
 + 
 +Cyber Security Essentiels, p. 76 
 +Local Proxies --Put a few information sheets on the desks of XY and convince users that the named IP is the new proxy that is needed 
 + 
 +__NSE References__ 
 + 
 +  * [[http://nmap.org/book/nse.html|Nmap Scripting Engine]] (Manual) 
 +  * [[http://thesprawl.org/research/writing-nse-scripts-for-vulnerability-scanning/|writing nmap nse scripts for vulnerability scanning]] 
 + 
 +__avernak.is__ 
 + 
 +{{rss>http://avernak.is/feed/atom/ 5 author date 1h }}
  • user/prometheus.1352763494.txt.gz
  • Last modified: 2015/07/15 21:54
  • (external edit)