Information security

694 Publication

? S.E. Note. Classical social engineering.

? S.E. Note. Classical social engineering. • To carry out a successful attack, attackers need three components: time, perseverance and patience. Often, attacks using social engineering are carried out gradually and methodically — not only data about the right people are collected, but also so-called "social signals". This is done in order to gain trust and circumvent the target. For ? S.E. Note. Classical social engineering.

?‍? Purple Team.

?‍? Purple Team. • Purple Team — Helps the Red Team and Blue Team to be friends with each other, allowing the blue team to develop a strategy and technical measures to protect the infrastructure based on the vulnerabilities and shortcomings discovered by the red team. The task of such a team is to ensure and maximize the efficiency of all teams. ?‍? Purple Team.

??‍? Steganography. Useful tools and resources.

??‍? Steganography. Useful tools and resources. • Steganography — for the first time this term was mentioned in 1499, and even then this word meant the transmission of information by keeping the fact of transmission secret. Oddly enough, nowadays steganography has not received widespread recognition among hackers, although it cannot be said that it has not been resorted to at all. ??‍? Steganography. Useful tools and resources.

? Scanners Box. Scanners for every taste and color.

? Scanners Box. Scanners for every taste and color. • There are no universal tools, and vulnerability scanners are no exception to this rule. Scanners are available with a free license and commercial. As you have already guessed, our channel is aimed at covering open source software and publishing material for free, which is why today I will share with you an excellent resource where various ? Scanners Box. Scanners for every taste and color.

? Fake Wi-Fi access points.

? Fake Wi-Fi access points. It is necessary to note one more risk factor (and for some, an opportunity) when using Wi-Fi technologies: fake access points. Attacks of this type have been carried out for about 15 years (the first known case was the use of a tool called "Jasager" in 2008), and are very simple: firstly, it is not difficult to develop a tool for such an attack on your own, ? Fake Wi-Fi access points.

Z-Wave technology.

Z-Wave technology. • Z-Wave is a wireless communication method that uses low—power radio waves that are safe for health. Installing a smart home powered by Z-Wave technology is extremely simple: there is no need to lay cables and wires, repair and interfere with the interior. The signal is perfectly transmitted through walls, floors and furniture. Z-Wave technology.