USB sticks can have more than bad stuff on the flash portion of the drive, the firmware can be tweaked to emulate a keyboard as a Hardware Input Device (HID). Wonderhowto.com has a walkthrough showing how easy it is. Hackaday has a great explanation of why plugging random USB devices into your computer can lead […]
Via Whiteboard Wednesday: How to Implement A Phishing Awareness Training Plan in 5 Steps: In this tutorial you’ll learn: Where to start when implementing a phishing awareness training program Which aspects of phishing warrant user training How to conduct phishing simulation tests What an ongoing training program looks like How to baseline and measure training […]
Full details at: https://www.kitploit.com/2017/12/ghostinthenet-ultimate-network.html How it works The basic and primary network protocol is ARP for IPv4 and NDP (ICMPv6) for IPv6, located in the link and network layer, provides main connectivity in a LAN. Despite its utility and simplicity, it has numerous vulnerabilities that can lead to a MITM attack and leak of confidentiality. Patching of such […]
Some good tips here that I’ll be implementing in my own .vimrc: https://dougblack.io/words/a-good-vimrc.html
Because you don’t want to spread your real phone number all around the web all willy-nilly. https://www.raymond.cc/blog/top-10-sites-receive-sms-online-without-phone/
An excellent walk-through here on transforming your Android Phone into a Network Pentesting Device. I was debating switching to the iPhone 5, but maybe I’ll go for the next Google phone instead.
Jay Turla of the Infosec Institute introduces us to a bunch of free tools, utilities, and resources to set up a lab where we can practice our penetration testing and elite haxxor skills: You don’t need to pay a single penny in setting up a pentesting lab because there are a lot of vulnerable distros […]