Preskoči na glavno vsebino
Stransko polje
Domov
Več
Išči
Zapri
Išči
Preklopi iskalni vnos
Slovenščina (sl)
English (en)
Slovenščina (sl)
Македонски (mk)
Русский (ru)
한국어 (ko)
Trenutno uporabljate gostujoči dostop
Prijavite se
Domov
Course Activities
BigBlueButton
Forumi
Naloge
Viri
Nedavno dostopani predmeti
You are not enrolled in any courses
Odpri kazalo predmeta
ipri3
Penetration Testing process and Breach databases [slides]
Penetration Testing process and Breach databases [slides]
Slides for lecture 2 and 3
6.0 MB Dokument PDF
Klikni na povezavo
Presentation Outline slides [pdf].pdf
za ogled datoteke.
◄ Homework 1 (DUE BY MONDAY 26.10.2020@12:00)
Skoči na ...
Skoči na ...
Forum novic
COURSE SLACK CHANNEL
ipri3 (INFOSEC)
Presentation (outline and ethics) [pdf]
Wannacry - outline
A set of links about notPetya
Fiske, Alan Page, & Tetlock, Philip E. (1997). Taboo Trade-offs: Reactions to Transactions That Transgress the Spheres of Justice
Slovene criminal law (6th edition) in Slovene
Kohlberg's theory of Moral development (1958)
Sykes, Gresham M., & Matza, David. (1957). Techniques of Neutralization: A Theory of Delinquency
Homework 1 (DUE BY MONDAY 26.10.2020@12:00)
ipri3-6138-LECT2and3
EU Data Protection Directive
SI-CERT resource on SI laws on cybercrime (In SLO)
A sample penetration testing report (by offensive security)
Nasu, H. (2015). STATE SECRETS LAW AND NATIONAL SECURITY
Ars Technica article on a huge passwords leak
nmap cheat sheet
haveibeenpwned?
Homework 2 (Submit by Monday 2.11.2020@12:00)
david.modic@fri1.uni-lj.si
Lecture 5. OSINT
NATO OSINT Manual
Google hacking tutorial
The Google Hacker’s Guide
Lovell, K. , Modic, D., & Maennel, O.M.. (2018). Exercise Mercury [REPORT]
kovter (malware package)
Password reuse statistics
Modic, D., Anderson, R., & Palomäki, J. (2018). We will make you like our research: The development of a susceptibility-to-persuasion scale
Long, Johnny, E, Skoudis, & A., van Eijkelenborg. (2004). Google hacking for penetration testers
Wilhelm, Thomas, & Andress, Jason. (2011). Ninja hacking : unconventional penetration testing tactics and techniques
Homework 3 - OSINT
ipri3-lect04-SHODAN
Shodan Presentation
Shodan search terms
Shodan null-byte Online tutorial
Shodan API overview
Shodan Beginner tutorial
Lee, Seungwoon, Shin, Seung-Hun, & Roh, Byeong-hee. (2017). Abnormal Behavior-Based Detection of Shodan and Censys-Like Scanning
Ercolani, V. J., Patton, M. W., & Chen, H. (2016). Shodan visualized
Phan, Thai, Krum, David M., & Bolas, Mark. (2016). ShodanVR Immersive visualization of text records from the Shodan database
Harsha, M. S., Bhavani, B. M., & Kundhavai, K. R. (2018). Analysis of vulnerabilities in MQTT security using Shodan API and implementation of its countermeasures via authentication and ACLs
Al-Alami, H., Hadi, A., & Al-Bahadili, H. (2017). Vulnerability scanning of IoT devices in Jordan using Shodan
Matherly, J. (2016). The Complete Guide to Shodan
Homework IV (submit by 23.11.2020 at 12:00)
ipri3-metasploit
metasploitable presentation
More in-depth tutorial course (recommended)
Metasploitable2 os guide
HumanAttackVectors.1
Presentation slides (part 1) [pdf]
Humphrey, N. (1976). The Social Function of Intellect
Modic, D., Anderson, R., & Palomäki, J. (2018). We will make you like our research
Herley, C. (2009). So Long, And No Thanks for the Externalities
Dyrud, M. A. (2005). I Brought You a Good News: An Analysis of Nigerian 419 Letters
Shadel, D. P., & Pak, K. B. S. (2007). The Psychology of Consumer Fraud
Fischer, P., Lea, S., & Evans, K. (2009). The Psychology of Scams
Modic, D., & Lea, S. E. G. (2011). How neurotic are scam victims, really? The big five and Internet scams
Modic, D., & Anderson, R. (2015). It’s All Over but the Crying
Titus, R. M., & Dover, A. R. (2001). Personal Fraud: The Victims and the Scams
Copes, H., Kerley, K. R., Mason, K. A., & Van Wyk, J. (2001). Reporting behavior of fraud victims and Black's theory of law: An empirical assessment
Modic, D., & Lea, S. E. G. (2013). Scam Compliance and the Psychology of Persuasion
Kanfer, F. H., & Karoly, P. (1972). Self-control: A behavioristic excursion into the lion's den
Muraven, M., & Baumeister, R. F. (2000). Self-regulation and depletion of limited resources: Does self-control resemble a muscle?
Nadel, S. F. (1953). Social Control and Self-Regulation
Gailliot, M. T., Baumeister, R. F., DeWall, C. N., Maner, J. K., Plant, E. A., Tice, D. M., . . . Schmeichel, B. J. (2007). Self-control relies on glucose as a limited energy source: Willpower is more than a metaphor
Wegner, D. M., Schneider, D. J., Carter, S. R., & White, T. L. (1987). Paradoxical effects of thought suppression
Logue, A. W. (1988). Research on self-control: An integrating framework
Metcalfe, J., & Mischel, W. (1999). A hot/cool-system analysis of delay of gratification: Dynamics of willpower
Muraven, M., Tice, D. M., & Baumeister, R. F. (1998). Self-control as a limited resource: Regulatory depletion patterns
Kuijer, R., de Ridder, D., Ouwehand, C., Houx, B., & van den Bos, R. (2008). Dieting as a case of behavioural decision making. Does self-control matter?
McCrae, R. R., & Costa, P. T. (1987). Validation of the five-factor model of personality across instruments and observers
Human Attack Vectors Part II
ipri3-unpacking-malware
Presentation [pptx]
ipri3-6138-LECT2and3 ►