[Nulled] » Programming » Hacking » Cybersecurity Stories: Playing True or False
January 13 2023

Cybersecurity Stories: Playing True or False

moderator 13-01-2023, 11:26 Programming / Hacking 110

The New Year is coming very soon, many are preparing for a holiday and a break from work or study. You can relax in different ways: many people stick to YT, read literature, go to other cities, watch TV shows or play games...

• Today I propose to play "Truth or Lie". The bottom line is that they tell us a short story about a security audit, and you have to determine whether it's true or not.

Example: A project on "social science". In a far northern city, the "Road Apple" attack vector was agreed with the customer, when flash drives with malware are "scattered". Printers with a USB connector were best suited: we left the media in them. After the first day of the attack, all the flash drives disappeared. We were delighted and laid out new ones. They're gone, too. On the third day — similarly. During all this time, there were no connections to our server. They began to watch with the IB service on the cameras — it turned out that the cleaner took all the flash drives for herself: she became another frontier of protection from the "social network".

Information

Visitors who are in the group Guests they can't download files.
Log in to the site under your login and password or if you are a new user go through the process registrations on the website.

Comments:

This publication has no comments yet. You can be the first!

Information the publication:

  • Author of the publication: moderator
  • Date of publication: 13 January 2023 11:26
  • Publication category(s): Programming / Hacking
  • Number of views of the publication: 110
  • Number of comments to the publication: 0

Related News

14 March 2022
Information security / DDOS
Distributed Network

Distributed Network Attacks / DDoS Distributed network attacks are often referred to as Distributed Denial of

Read more
13 March 2022
Information security
Social engineering

Social engineering In one of the last articles, we discussed the changes in social engineering scenarios that the

Read more
13 March 2022
Information security
From Prototype Pollution

From Prototype Pollution to RCE on ZeroNight X As part of this article, we will look at the vulnerability of

Read more
11 November 2022
Web Templates / HTML Templates website
Destiny Role Play HTML

Destiny Role Play HTML Template - Home page; - How to start playing page; - Server monitoring; - Personal account;

Read more
14 March 2022
Information security / DDOS
What are DDoS attacks

What are DDoS attacks and why is it harder to defend from year to year According to the NETSCOUT Threat

Read more

Information

Users of visitor are not allowed to comment this publication.

Site Search

Site Menu


☑ Scripts Software

Calendar

«    May 2024    »
MonTueWedThuFriSatSun
 12345
6789101112
13141516171819
20212223242526
2728293031 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +8 Total articles 5578
  • +15 Comments 3150
  • +32 Users : 4132