Posts

Showing posts from February, 2021

Command Injection Hacking

Image
This workshop requires a little bit of setup. Here is the set up guide that accompanies this workshop: You may also appreciate viewing the post on setting up a virtual machine . https://docs.google.com/document/d/1fHNyp10q6wtDIHVffvfKaAqL7iz2I5xj_-ctKpRmBVo/edit?usp=sharing You can view the slides for the workshop  here :

How to Create and Setup a Virtual Machine.

Image
 In this post, we provide a nearly step by step guide on how to use virtual box to create a virtual machine, install some extra features to make it easier to work with, install two different distributions of linux, and show how to network those two machines together! Here is a video walkthrough as well:

Creating a Social Engineering Script

Image
This video covers the process of creating a social engineering script.   The "big picture" view shows how to create a social engineering script from what to do, figuring out the goal, and contacting the target to perform the attack goal as a whole process. Next, the "single call" view illustrates a general framework of talking to individuals.  The results of the individual social engineering attacks can include but is not limited to such items as contact information and internal information.  Several videos of sample social engineering attacks are shown.  If you wish to further develop skills related to this topic three books that are recommended: “ How to Win Friends and Influence People ”, “ Thinking Fast and Slow ”, and “ The Art of Deception. ”  This video was produced for academic purposes for identifying social engineering.  This is not an endorsement of any illegal activity. The purpose is to improve cyber security practices and to educate other...