How to hack a Wi-Fi router?
15-01-2023, 12:50
The New Year is coming very soon, many are preparing for a holiday and a break from work or study. You can relax in different ways: many people stick to YT, read literature, go to other cities, watch TV shows or play games...
• Today I propose to play "Truth or Lie". The bottom line is that they tell us a short story about a security audit, and you have to determine whether it's true or not.
Example: A project on "social science". In a far northern city, the "Road Apple" attack vector was agreed with the customer, when flash drives with malware are "scattered". Printers with a USB connector were best suited: we left the media in them. After the first day of the attack, all the flash drives disappeared. We were delighted and laid out new ones. They're gone, too. On the third day — similarly. During all this time, there were no connections to our server. They began to watch with the IB service on the cameras — it turned out that the cleaner took all the flash drives for herself: she became another frontier of protection from the "social network".
15-01-2023, 12:50
25-01-2023, 16:11
24-02-2022, 12:18
There are no comments
Information
Users of Visitor are not allowed to comment this publication.