This is an old revision of the document!


"transparency for the powerful, privacy for the weak" – Juian Assange

[+] (0xA2E6C1D6)


[+] @JanGuth


Social Engineering References


Cyber Security Essentiels, p. 76 Local Proxies –> Put a few information sheets on the desks of XY and convince users that the named IP is the new proxy that is needed

NSE References

  • user/prometheus.1403822801.txt.gz
  • Last modified: 2015/07/15 21:54
  • (external edit)