ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Cyber Security

    MangoCon
    7
    13
    1.5k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • I
      IRJ
      last edited by

      I will be sharing some of the hacking I learned in the cyber security session. I was thinking we were going to focus on malware for this session. Do these topics sound good or would you like to do something different.

      Exercises would include:

      Building, concealing, and deploying a Trojan. Then testing the Trojan against 52 major antivirus brands to see which ones pick it up if any.

      Clone a legitimate website, send out a phishing email, and harvest credentials.

      (If we have time) Cracking passwords using dictionary and brute force attacks

      L 1 Reply Last reply Reply Quote 1
      • L
        Lakshmana @IRJ
        last edited by

        @IRJ Brute Force done in Kali or Parrot

        I 1 Reply Last reply Reply Quote 0
        • C
          coliver
          last edited by

          This could be a great topic for MangoCon if @Minion-Queen still has some spots open!

          1 Reply Last reply Reply Quote 1
          • M
            Minion Queen Banned
            last edited by

            It is a topic for MangoCon 🙂

            1 Reply Last reply Reply Quote 1
            • I
              IRJ @Lakshmana
              last edited by

              @Lakshmana said in Cyber Security:

              @IRJ Brute Force done in Kali or Parrot

              Windows and Kali

              L 1 Reply Last reply Reply Quote 0
              • L
                Lakshmana @IRJ
                last edited by

                @IRJ With Which tools the testing will be done ??

                I 1 Reply Last reply Reply Quote 0
                • I
                  IRJ @Lakshmana
                  last edited by

                  @Lakshmana said in Cyber Security:

                  @IRJ With Which tools the testing will be done ??

                  I believe the session will be recorded. I can't reveal until Mangocon 😛

                  1 Reply Last reply Reply Quote 2
                  • D
                    Dashrender
                    last edited by

                    Awesome I like this panel already.

                    1 Reply Last reply Reply Quote 2
                    • I
                      IRJ
                      last edited by

                      It will be interesting to see if Webroot detects our Trojan, @Nic

                      D N P 3 Replies Last reply Reply Quote 0
                      • D
                        Dashrender @IRJ
                        last edited by

                        @IRJ said in Cyber Security:

                        It will be interesting to see if Webroot detects our Trojan, @Nic

                        Webroot detects 7z.exe in chocolatey v10 as a trojan.

                        1 Reply Last reply Reply Quote 1
                        • N
                          Nic @IRJ
                          last edited by

                          @IRJ said in Cyber Security:

                          It will be interesting to see if Webroot detects our Trojan, @Nic

                          I'm excited to find out!

                          1 Reply Last reply Reply Quote 2
                          • P
                            prcssupport @IRJ
                            last edited by

                            @IRJ said in Cyber Security:

                            It will be interesting to see if Webroot detects our Trojan, @Nic

                            I use and love Comodos Endpoint security. I would love to see how that fairs.

                            1 Reply Last reply Reply Quote 0
                            • I
                              IRJ
                              last edited by

                              WPA 2 hacking was also mentioned. What would do you guys really want to see?

                              1 Reply Last reply Reply Quote 0
                              • 1 / 1
                              • First post
                                Last post