Skip to main content
Side panel
Home
More
Search
Close
Search
Toggle search input
English (en)
English (en)
Slovenščina (sl)
Македонски (mk)
Русский (ru)
한국어 (ko)
You are currently using guest access
Log in
Home
Course Activities
Assignments
BigBlueButton
Forums
Resources
Recent Courses
You are not enrolled in any courses
Open course index
ipri3
HumanAttackVectors.1
HumanAttackVectors.1
HumanAttackVectors.1
Waiting for a moderator to join.
Recordings
◄ Metasploitable2 os guide
Jump to...
Jump to...
Forum novic
COURSE SLACK CHANNEL
ipri3 (INFOSEC)
Presentation (outline and ethics) [pdf]
Wannacry - outline
A set of links about notPetya
Fiske, Alan Page, & Tetlock, Philip E. (1997). Taboo Trade-offs: Reactions to Transactions That Transgress the Spheres of Justice
Slovene criminal law (6th edition) in Slovene
Kohlberg's theory of Moral development (1958)
Sykes, Gresham M., & Matza, David. (1957). Techniques of Neutralization: A Theory of Delinquency
Homework 1 (DUE BY MONDAY 26.10.2020@12:00)
Penetration Testing process and Breach databases [slides]
ipri3-6138-LECT2and3
EU Data Protection Directive
SI-CERT resource on SI laws on cybercrime (In SLO)
A sample penetration testing report (by offensive security)
Nasu, H. (2015). STATE SECRETS LAW AND NATIONAL SECURITY
Ars Technica article on a huge passwords leak
nmap cheat sheet
haveibeenpwned?
Homework 2 (Submit by Monday 2.11.2020@12:00)
david.modic@fri1.uni-lj.si
Lecture 5. OSINT
NATO OSINT Manual
Google hacking tutorial
The Google Hacker’s Guide
Lovell, K. , Modic, D., & Maennel, O.M.. (2018). Exercise Mercury [REPORT]
kovter (malware package)
Password reuse statistics
Modic, D., Anderson, R., & Palomäki, J. (2018). We will make you like our research: The development of a susceptibility-to-persuasion scale
Long, Johnny, E, Skoudis, & A., van Eijkelenborg. (2004). Google hacking for penetration testers
Wilhelm, Thomas, & Andress, Jason. (2011). Ninja hacking : unconventional penetration testing tactics and techniques
Homework 3 - OSINT
ipri3-lect04-SHODAN
Shodan Presentation
Shodan search terms
Shodan null-byte Online tutorial
Shodan API overview
Shodan Beginner tutorial
Lee, Seungwoon, Shin, Seung-Hun, & Roh, Byeong-hee. (2017). Abnormal Behavior-Based Detection of Shodan and Censys-Like Scanning
Ercolani, V. J., Patton, M. W., & Chen, H. (2016). Shodan visualized
Phan, Thai, Krum, David M., & Bolas, Mark. (2016). ShodanVR Immersive visualization of text records from the Shodan database
Harsha, M. S., Bhavani, B. M., & Kundhavai, K. R. (2018). Analysis of vulnerabilities in MQTT security using Shodan API and implementation of its countermeasures via authentication and ACLs
Al-Alami, H., Hadi, A., & Al-Bahadili, H. (2017). Vulnerability scanning of IoT devices in Jordan using Shodan
Matherly, J. (2016). The Complete Guide to Shodan
Homework IV (submit by 23.11.2020 at 12:00)
ipri3-metasploit
metasploitable presentation
More in-depth tutorial course (recommended)
Metasploitable2 os guide
Presentation slides (part 1) [pdf]
Humphrey, N. (1976). The Social Function of Intellect
Modic, D., Anderson, R., & Palomäki, J. (2018). We will make you like our research
Herley, C. (2009). So Long, And No Thanks for the Externalities
Dyrud, M. A. (2005). I Brought You a Good News: An Analysis of Nigerian 419 Letters
Shadel, D. P., & Pak, K. B. S. (2007). The Psychology of Consumer Fraud
Fischer, P., Lea, S., & Evans, K. (2009). The Psychology of Scams
Modic, D., & Lea, S. E. G. (2011). How neurotic are scam victims, really? The big five and Internet scams
Modic, D., & Anderson, R. (2015). It’s All Over but the Crying
Titus, R. M., & Dover, A. R. (2001). Personal Fraud: The Victims and the Scams
Copes, H., Kerley, K. R., Mason, K. A., & Van Wyk, J. (2001). Reporting behavior of fraud victims and Black's theory of law: An empirical assessment
Modic, D., & Lea, S. E. G. (2013). Scam Compliance and the Psychology of Persuasion
Kanfer, F. H., & Karoly, P. (1972). Self-control: A behavioristic excursion into the lion's den
Muraven, M., & Baumeister, R. F. (2000). Self-regulation and depletion of limited resources: Does self-control resemble a muscle?
Nadel, S. F. (1953). Social Control and Self-Regulation
Gailliot, M. T., Baumeister, R. F., DeWall, C. N., Maner, J. K., Plant, E. A., Tice, D. M., . . . Schmeichel, B. J. (2007). Self-control relies on glucose as a limited energy source: Willpower is more than a metaphor
Wegner, D. M., Schneider, D. J., Carter, S. R., & White, T. L. (1987). Paradoxical effects of thought suppression
Logue, A. W. (1988). Research on self-control: An integrating framework
Metcalfe, J., & Mischel, W. (1999). A hot/cool-system analysis of delay of gratification: Dynamics of willpower
Muraven, M., Tice, D. M., & Baumeister, R. F. (1998). Self-control as a limited resource: Regulatory depletion patterns
Kuijer, R., de Ridder, D., Ouwehand, C., Houx, B., & van den Bos, R. (2008). Dieting as a case of behavioural decision making. Does self-control matter?
McCrae, R. R., & Costa, P. T. (1987). Validation of the five-factor model of personality across instruments and observers
Human Attack Vectors Part II
ipri3-unpacking-malware
Presentation [pptx]
Presentation slides (part 1) [pdf] ►