주요 내용으로 넘어가기
Side panel
홈
More
검색
닫기
검색
Toggle search input
한국어 (ko)
English (en)
Slovenščina (sl)
Македонски (mk)
Русский (ru)
한국어 (ko)
손님 계정으로 접속
로그인
홈
Course Activities
과제물들
포럼모음
학습자료
BigBlueButton
Recent Courses
You are not enrolled in any courses
Open course index
Open block drawer
Selected Topics in Computer and Information Science
You are currently viewing this course as
gost
.
주별 개요
공통
모두 접기
모두 펼치기
Forum novic
포럼
21.10@16:30 online and in P19 -> Outline of the Course, and Hacking Ethics
COURSE SLACK CHANNEL
URL
ipri3 (INFOSEC)
BigBlueButton
Presentation (outline and ethics) [pdf]
파일
2020/10/13 14:57 업로드됨
Wannacry - outline
URL
A set of links about notPetya
URL
Fiske, Alan Page, & Tetlock, Philip E. (1997). Taboo Trade-offs: Reactions to Transactions That Transgress the Spheres of Justice
파일
2020/10/12 09:06 업로드됨
Slovene criminal law (6th edition) in Slovene
파일
2020/10/12 09:06 업로드됨
Kohlberg's theory of Moral development (1958)
파일
2020/10/12 09:06 업로드됨
Sykes, Gresham M., & Matza, David. (1957). Techniques of Neutralization: A Theory of Delinquency
파일
2020/10/12 09:06 업로드됨
Homework 1 (DUE BY MONDAY 26.10.2020@12:00)
과제
28.10.@16:30 -> PENetration TESTing, and Breach databases
Penetration Testing process and Breach databases [slides]
파일
6.0 MB документ PDF
ipri3-6138-LECT2and3
BigBlueButton
EU Data Protection Directive
URL
SI-CERT resource on SI laws on cybercrime (In SLO)
URL
A sample penetration testing report (by offensive security)
파일
2020/10/12 09:06 업로드됨
Nasu, H. (2015). STATE SECRETS LAW AND NATIONAL SECURITY
파일
2020/10/12 09:06 업로드됨
Ars Technica article on a huge passwords leak
URL
nmap cheat sheet
URL
haveibeenpwned?
URL
Homework 2 (Submit by Monday 2.11.2020@12:00)
과제
4.11.@16:30 -> Open source Intelligence Gathering
david.modic@fri1.uni-lj.si
BigBlueButton
Lecture 5. OSINT
파일
2020/11/2 21:19 업로드됨
NATO OSINT Manual
파일
2020/10/12 09:06 업로드됨
Google hacking tutorial
URL
The Google Hacker’s Guide
파일
2020/10/12 09:06 업로드됨
Lovell, K. , Modic, D., & Maennel, O.M.. (2018). Exercise Mercury [REPORT]
파일
2020/10/12 09:06 업로드됨
kovter (malware package)
URL
Password reuse statistics
URL
Modic, D., Anderson, R., & Palomäki, J. (2018). We will make you like our research: The development of a susceptibility-to-persuasion scale
파일
2020/10/12 09:06 업로드됨
Long, Johnny, E, Skoudis, & A., van Eijkelenborg. (2004). Google hacking for penetration testers
파일
2020/10/12 09:06 업로드됨
Wilhelm, Thomas, & Andress, Jason. (2011). Ninja hacking : unconventional penetration testing tactics and techniques
파일
2020/10/12 09:06 업로드됨
Homework 3 - OSINT
과제
18.11@16:30 -> Shodan
ipri3-lect04-SHODAN
BigBlueButton
Shodan Presentation
파일
2020/11/16 10:52 업로드됨
Shodan search terms
파일
2020/10/12 09:06 업로드됨
Shodan null-byte Online tutorial
URL
Shodan API overview
URL
Shodan Beginner tutorial
URL
Lee, Seungwoon, Shin, Seung-Hun, & Roh, Byeong-hee. (2017). Abnormal Behavior-Based Detection of Shodan and Censys-Like Scanning
파일
2020/10/12 09:06 업로드됨
Ercolani, V. J., Patton, M. W., & Chen, H. (2016). Shodan visualized
파일
2020/10/12 09:06 업로드됨
Phan, Thai, Krum, David M., & Bolas, Mark. (2016). ShodanVR Immersive visualization of text records from the Shodan database
파일
2020/10/12 09:06 업로드됨
Harsha, M. S., Bhavani, B. M., & Kundhavai, K. R. (2018). Analysis of vulnerabilities in MQTT security using Shodan API and implementation of its countermeasures via authentication and ACLs
파일
2020/10/12 09:06 업로드됨
Al-Alami, H., Hadi, A., & Al-Bahadili, H. (2017). Vulnerability scanning of IoT devices in Jordan using Shodan
파일
2020/10/12 09:06 업로드됨
Matherly, J. (2016). The Complete Guide to Shodan
파일
2020/10/12 09:06 업로드됨
Homework IV (submit by 23.11.2020 at 12:00)
과제
18.11@17:30 -> metasploit
ipri3-metasploit
BigBlueButton
metasploitable presentation
파일
2020/11/18 09:47 업로드됨
More in-depth tutorial course (recommended)
URL
Metasploitable2 os guide
URL
25.11.@16:30 -> Human Attack Vectors Part 1
HumanAttackVectors.1
BigBlueButton
Presentation slides (part 1) [pdf]
파일
2020/11/23 14:44 업로드됨
Humphrey, N. (1976). The Social Function of Intellect
파일
2020/10/12 09:06 업로드됨
Modic, D., Anderson, R., & Palomäki, J. (2018). We will make you like our research
파일
2020/10/12 09:06 업로드됨
Herley, C. (2009). So Long, And No Thanks for the Externalities
파일
2020/10/12 09:06 업로드됨
Dyrud, M. A. (2005). I Brought You a Good News: An Analysis of Nigerian 419 Letters
파일
2020/10/12 09:06 업로드됨
Shadel, D. P., & Pak, K. B. S. (2007). The Psychology of Consumer Fraud
파일
2020/10/12 09:06 업로드됨
Fischer, P., Lea, S., & Evans, K. (2009). The Psychology of Scams
파일
2020/10/12 09:06 업로드됨
Modic, D., & Lea, S. E. G. (2011). How neurotic are scam victims, really? The big five and Internet scams
파일
2020/10/12 09:06 업로드됨
Modic, D., & Anderson, R. (2015). It’s All Over but the Crying
파일
2020/10/12 09:06 업로드됨
Titus, R. M., & Dover, A. R. (2001). Personal Fraud: The Victims and the Scams
파일
2020/10/12 09:06 업로드됨
Copes, H., Kerley, K. R., Mason, K. A., & Van Wyk, J. (2001). Reporting behavior of fraud victims and Black's theory of law: An empirical assessment
파일
2020/10/12 09:06 업로드됨
Modic, D., & Lea, S. E. G. (2013). Scam Compliance and the Psychology of Persuasion
파일
2020/10/12 09:06 업로드됨
Kanfer, F. H., & Karoly, P. (1972). Self-control: A behavioristic excursion into the lion's den
파일
2020/10/12 09:06 업로드됨
Muraven, M., & Baumeister, R. F. (2000). Self-regulation and depletion of limited resources: Does self-control resemble a muscle?
파일
2020/10/12 09:06 업로드됨
Nadel, S. F. (1953). Social Control and Self-Regulation
파일
2020/10/12 09:06 업로드됨
Gailliot, M. T., Baumeister, R. F., DeWall, C. N., Maner, J. K., Plant, E. A., Tice, D. M., . . . Schmeichel, B. J. (2007). Self-control relies on glucose as a limited energy source: Willpower is more than a metaphor
파일
2020/10/12 09:06 업로드됨
Wegner, D. M., Schneider, D. J., Carter, S. R., & White, T. L. (1987). Paradoxical effects of thought suppression
파일
2020/10/12 09:06 업로드됨
Logue, A. W. (1988). Research on self-control: An integrating framework
파일
2020/10/12 09:06 업로드됨
Metcalfe, J., & Mischel, W. (1999). A hot/cool-system analysis of delay of gratification: Dynamics of willpower
파일
2020/10/12 09:06 업로드됨
Muraven, M., Tice, D. M., & Baumeister, R. F. (1998). Self-control as a limited resource: Regulatory depletion patterns
파일
2020/10/12 09:06 업로드됨
Kuijer, R., de Ridder, D., Ouwehand, C., Houx, B., & van den Bos, R. (2008). Dieting as a case of behavioural decision making. Does self-control matter?
파일
2020/10/12 09:06 업로드됨
McCrae, R. R., & Costa, P. T. (1987). Validation of the five-factor model of personality across instruments and observers
파일
2020/10/12 09:06 업로드됨
02.12.@16:30 Human Attack Vectors Part II.
Human Attack Vectors Part II
BigBlueButton
09.12.@16:30 Unpacking Malware (Urban Suhadolnik) - POSTPONED TO NEXT WEEK
This talk will be on 16th December @ 16:30
16.12.@16:45 Team assignment overview IS POSPTPONED. Today: UNPACKING MALWARE and a short Q&A if there are any.
ipri3-unpacking-malware
BigBlueButton
Presentation [pptx]
파일
2020/12/16 15:39 업로드됨
13.1.2021 Final Presentation