background preloader

Social Engineering - Security Through Education

Social Engineering - Security Through Education
Social Engineering (SE) is both incredibly complex and amazingly simple. What really is social engineering? We define it as the act of manipulating a person to accomplish goals that may or may not be in the “target’s” best interest. This may include obtaining information , gaining access, or getting the target to take certain action. Due to the mystery surrounding this dark art many people are afraid of it, or they feel they will never be able to accomplish a successful social engineering test. However, every time you try to get someone to do something that is in your interest, you are engaging in social engineering.

http://www.social-engineer.org/

Compass Module This is a fully integrated compass module that combines the Honeywell HMC6352 2-axis magneto-resistive sensors with the required analog and digital support circuits, microprocessor and algorithms for heading computation. It comes assembled with a 4-pin male header soldered on. The Compass Sensor is fully integrated with the Antipasto Arduino IDE and can provide compass headings in degrees over Arduino serial. Help Us, Hackers, You’re Our Only Hope, NSA Chief Tells DefCon Let's hope he wasn't carrying anything unsecured on his Blackberry. By Kelly Faircloth 7/30/12 8:53am Share this: General Alexander. (Photo: Wikipedia) How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?".

How To Hack Into Someones Webcam Updated Instructions Working! (Hd) Description: In this video i'll show how to "hack" into someones webcam using the Social engineering Toolkit + Java Exploit ;) what gains the attacker a meterpreter shell with this shell it is possbile to take a snapshot Song - Face the Wolf - Well hello there, mothership Zeta Tags: meterpreter , metasploit , webcam , Disclaimer: We are a infosec video aggregator and this video is linked from an external website.

8. Cyberstalking tools for reconnaissance - Nine must-have OSINT tools searchSecurity.in Nine must-have OSINT tools 8. FreeScan Cordless Handheld Scanner Capable of turning any print materials into digital files, this handheld scanner makes preserving important files, receipts, and any other documents easy! Digitizing newspaper snippets, business cards, and receipts is fast and easy with this Cordless Handheld Scanner. Just move the scanner over an area and its sensitive color image sensor scans at high (600 DPI) or standard (300 DPI) resolution, saving images onto a microSD card for easy retrieval. Photos, business cards, books, newspapers, magazines, receipts, notes - the FreeScan Cordless Handheld Scanner is great for everything! No more worrying about getting documents dirty or damaged, no more worrying about misplacing or losing papers. With the FreeScan Cordless Handheld Scanner, everything is digitized, everything you scan is saved onto a micro SD card for future use!

Full SQL Injection Tutorial (MySQL) Full SQL Injection Tutorial (MySQL) In this tutorial i will describe how sql injection works and how touse it to get some useful information. First of all: What is SQL injection?It’s one of the most common vulnerability in web applications today.It allows attacker to execute database query in url and gain accessto some confidential information etc…(in shortly). 1.SQL Injection (classic or error based or whatever you call it) 2.Blind SQL Injection (the harder part) So let’s start with some action

Programmable HID USB Keystroke Dongle: Using the Teensy as a pen testing device Programmable HID USB Keystroke Dongle: Using the Teensy as a pen testing device Quick Links To Sections: Introduction So, why would a pen-tester want one? 15 Great Ways to Secure Your Website Since there are no point and click software, like an Anti Virus solution, available to secure a website, people just consider the job is done once the website is up. It definitely is not. Protecting a website or webserver is possible only by continued efforts. Unlike a poorly protected desktop in your place of business, a hacked website will reflect poorly on you, your business or brand. With the sheer volume of zero day threats emanating all the time, there may not be fit it and forget solutions for protecting a website.

Motion Activated Camera - Day of the New Dan December 20, 2009 I made a relatively simple attachment to my Canon SLR to create a motion activated camera using Arduino. A lot of this was based on and inspired by the intervalometer project at The Honey Jar. FreedomBox Foundation For those of you who have not heard through the mailing list or in the project's IRC channel (#freedombox on FreedomBox has reached the 0.2 release. This second release is still intended for developers but represents a significant maturation of the components we have discussed here in the past and a big step forward for the project as a whole. 0.2 features Plinth, our user interface tool, is now connected to a number of running systems on the box including PageKite, an XMPP chat server, local network administration if you want to use the FreedomBox as a home router, and some diagnostic and general system configuration tools. Plinth also has support for downloading and installing ownCloud.

Related: