Перейти к основному содержанию
Боковая панель
В начало
Дополнительно
Найти
Закрыть
Найти
Изменить данные поисковой строки
Русский (ru)
English (en)
Slovenščina (sl)
Македонски (mk)
Русский (ru)
한국어 (ko)
Вы используете гостевой доступ
Вход
В начало
Course Activities
Видеоконференции BigBlueButton
Задания
Ресурсы
Форумы
Recent Courses
You are not enrolled in any courses
Открыть оглавление курса
ipri3
Shodan Presentation
Shodan Presentation
SHODAN
Загружено 16/11/20, 10:52
Нажмите на ссылку
Modic, D. (2020).04.SHODAN.BBB.pdf
, чтобы просмотреть файл.
◄ ipri3-lect04-SHODAN
Перейти на...
Перейти на...
Forum novic
COURSE SLACK CHANNEL
ipri3 (INFOSEC)
Presentation (outline and ethics) [pdf]
Wannacry - outline
A set of links about notPetya
Fiske, Alan Page, & Tetlock, Philip E. (1997). Taboo Trade-offs: Reactions to Transactions That Transgress the Spheres of Justice
Slovene criminal law (6th edition) in Slovene
Kohlberg's theory of Moral development (1958)
Sykes, Gresham M., & Matza, David. (1957). Techniques of Neutralization: A Theory of Delinquency
Homework 1 (DUE BY MONDAY 26.10.2020@12:00)
Penetration Testing process and Breach databases [slides]
ipri3-6138-LECT2and3
EU Data Protection Directive
SI-CERT resource on SI laws on cybercrime (In SLO)
A sample penetration testing report (by offensive security)
Nasu, H. (2015). STATE SECRETS LAW AND NATIONAL SECURITY
Ars Technica article on a huge passwords leak
nmap cheat sheet
haveibeenpwned?
Homework 2 (Submit by Monday 2.11.2020@12:00)
david.modic@fri1.uni-lj.si
Lecture 5. OSINT
NATO OSINT Manual
Google hacking tutorial
The Google Hacker’s Guide
Lovell, K. , Modic, D., & Maennel, O.M.. (2018). Exercise Mercury [REPORT]
kovter (malware package)
Password reuse statistics
Modic, D., Anderson, R., & Palomäki, J. (2018). We will make you like our research: The development of a susceptibility-to-persuasion scale
Long, Johnny, E, Skoudis, & A., van Eijkelenborg. (2004). Google hacking for penetration testers
Wilhelm, Thomas, & Andress, Jason. (2011). Ninja hacking : unconventional penetration testing tactics and techniques
Homework 3 - OSINT
ipri3-lect04-SHODAN
Shodan search terms
Shodan null-byte Online tutorial
Shodan API overview
Shodan Beginner tutorial
Lee, Seungwoon, Shin, Seung-Hun, & Roh, Byeong-hee. (2017). Abnormal Behavior-Based Detection of Shodan and Censys-Like Scanning
Ercolani, V. J., Patton, M. W., & Chen, H. (2016). Shodan visualized
Phan, Thai, Krum, David M., & Bolas, Mark. (2016). ShodanVR Immersive visualization of text records from the Shodan database
Harsha, M. S., Bhavani, B. M., & Kundhavai, K. R. (2018). Analysis of vulnerabilities in MQTT security using Shodan API and implementation of its countermeasures via authentication and ACLs
Al-Alami, H., Hadi, A., & Al-Bahadili, H. (2017). Vulnerability scanning of IoT devices in Jordan using Shodan
Matherly, J. (2016). The Complete Guide to Shodan
Homework IV (submit by 23.11.2020 at 12:00)
ipri3-metasploit
metasploitable presentation
More in-depth tutorial course (recommended)
Metasploitable2 os guide
HumanAttackVectors.1
Presentation slides (part 1) [pdf]
Humphrey, N. (1976). The Social Function of Intellect
Modic, D., Anderson, R., & Palomäki, J. (2018). We will make you like our research
Herley, C. (2009). So Long, And No Thanks for the Externalities
Dyrud, M. A. (2005). I Brought You a Good News: An Analysis of Nigerian 419 Letters
Shadel, D. P., & Pak, K. B. S. (2007). The Psychology of Consumer Fraud
Fischer, P., Lea, S., & Evans, K. (2009). The Psychology of Scams
Modic, D., & Lea, S. E. G. (2011). How neurotic are scam victims, really? The big five and Internet scams
Modic, D., & Anderson, R. (2015). It’s All Over but the Crying
Titus, R. M., & Dover, A. R. (2001). Personal Fraud: The Victims and the Scams
Copes, H., Kerley, K. R., Mason, K. A., & Van Wyk, J. (2001). Reporting behavior of fraud victims and Black's theory of law: An empirical assessment
Modic, D., & Lea, S. E. G. (2013). Scam Compliance and the Psychology of Persuasion
Kanfer, F. H., & Karoly, P. (1972). Self-control: A behavioristic excursion into the lion's den
Muraven, M., & Baumeister, R. F. (2000). Self-regulation and depletion of limited resources: Does self-control resemble a muscle?
Nadel, S. F. (1953). Social Control and Self-Regulation
Gailliot, M. T., Baumeister, R. F., DeWall, C. N., Maner, J. K., Plant, E. A., Tice, D. M., . . . Schmeichel, B. J. (2007). Self-control relies on glucose as a limited energy source: Willpower is more than a metaphor
Wegner, D. M., Schneider, D. J., Carter, S. R., & White, T. L. (1987). Paradoxical effects of thought suppression
Logue, A. W. (1988). Research on self-control: An integrating framework
Metcalfe, J., & Mischel, W. (1999). A hot/cool-system analysis of delay of gratification: Dynamics of willpower
Muraven, M., Tice, D. M., & Baumeister, R. F. (1998). Self-control as a limited resource: Regulatory depletion patterns
Kuijer, R., de Ridder, D., Ouwehand, C., Houx, B., & van den Bos, R. (2008). Dieting as a case of behavioural decision making. Does self-control matter?
McCrae, R. R., & Costa, P. T. (1987). Validation of the five-factor model of personality across instruments and observers
Human Attack Vectors Part II
ipri3-unpacking-malware
Presentation [pptx]
Shodan search terms ►