All public logs
Jump to navigation
Jump to search
Combined display of all available logs of Embedded Lab Vienna for IoT & Security. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
(newest | oldest) View (newer 20 | older 20) (20 | 50 | 100 | 250 | 500)- 16:29, 12 March 2024 User account PDallanmis talk contribs was created by Ikramer talk contribs and password was sent by email
- 16:25, 12 March 2024 User account Test talk contribs was created by Ikramer talk contribs and password was sent by email
- 18:14, 4 March 2024 GKlaus talk contribs created page Shark Jack (Created page with "{{Device|device_name=Shark Jack network attack tool|manufacturer=Hak5|link=https://lab401.com/products/shark-jack|image_link=https://stuff.elvis.science/uploads/models/assetmodel-image-8EubvbfP6k.png|description=Portable network attack tool, fast nmap scans. The Shark-Jack is a pen-testing utility developed by the ”Hak5” company and is designed for Ethernet plug and play vulnerability scanning in LANs. In its most basic form, it is essentially a small Linux-machine w...")
- 18:08, 4 March 2024 IIvkic talk contribs created page USB Rubber Ducky: Threats and Mitigation (Created page with "== USB Rubber Ducky == === Description === The USB Rubber Ducky is a discreet penetration testing device designed to operate covertly by masquerading as a standard USB keyboard. Its versatility lies in its capability to execute predefined scripts upon connection, enabling security professionals to evaluate and potentially exploit USB vulnerabilities. This device is an essential tool in USB security assessments, allowing for the simulation of various attack scenarios,...")
- 17:59, 4 March 2024 PKraubner talk contribs created page File:01 mitnicks attack circle.png (Kevin Mitnicks Social Engineering Attack Circle)
- 17:59, 4 March 2024 PKraubner talk contribs uploaded File:01 mitnicks attack circle.png (Kevin Mitnicks Social Engineering Attack Circle)
- 01:17, 4 March 2024 NSelimovic talk contribs created page Password Security, Threats and Measures (Created page with "== Summary == This documentation provides an overview of the threats to passwords and the security measures taken against them. Furtheron, this article provides a presentation on how to crack a password with the pentesting tool "John The Ripper". == Password Security == Passwords are the most used authentication method. Therefore, the security of a password is of significant importance. The strenght of a password can be measured through the quality of the password or...")
- 23:00, 2 March 2024 HAlraei talk contribs created page Talk:WiFi Security (Created page with "<ref>{{Cite web |url=https://github.com/deiv/driftnet |title=Driftnet on GitHub |author=deiv |access-date=2024-03-02}}</ref>")
- 22:20, 2 March 2024 HAlraei talk contribs created page Template:Cite web (Created page with "<ref>{{Cite web |url=https://ieeexplore.ieee.org/document/5234856 |title=A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) |author1=Arash Habibi Lashkari |author2=Mir Mohammad Seyed Danesh |author3=Behrang Samadi |year=2009 |work=IEEE Xplore |access-date=}}</ref>")
- 22:00, 2 March 2024 HAlraei talk contribs created page Template:Cite conference (Created page with "Arash Habibi Lashkari, Mir Mohammad Seyed Danesh, and Behrang Samadi. A survey on wireless security protocols (wep, wpa and wpa2/802.11i). In 2009 2nd IEEE International Conference on Com- puter Science and Information Technology, pages 48–52, 200")
- 14:30, 2 March 2024 DMansy talk contribs created page Privacy Focused Operating Systems (Created page with "== Introduction == Privacy-focused operating systems aim to safeguard user privacy and security through advanced features such as encryption, anonymization, and strict data access control. In contrast to traditional operating systems, these privacy-centric alternatives prioritize minimizing privacy risks and thwarting unauthorized data collection, tracking, and surveillance. === Overview of Main Problems === ==== Data Breaches and Unauthorized Access ==== Traditional...")
- 16:52, 29 February 2024 DMansy talk contribs created page Social Engineering & Phishing Platform (Created page with "== Social Engineering == '''Social Engineering''' is a kind of cyber attack that influences a person to take an action that may or may not be in their best interests, according to Hadnagy. It relies on psychological manipulation with the goal of making individuals perform actions or share confidential information. === Social Engineering Attack Cycle === Social engineering is a process that requires a deep understanding of psychology, keen senses, and tons of research...")
- 16:46, 29 February 2024 DMansy talk contribs created page File:Mail.PNG
- 16:46, 29 February 2024 DMansy talk contribs uploaded File:Mail.PNG
- 16:40, 29 February 2024 DMansy talk contribs created page File:Shoulder2.PNG
- 16:40, 29 February 2024 DMansy talk contribs uploaded File:Shoulder2.PNG
- 16:40, 29 February 2024 DMansy talk contribs created page File:Shoulder.PNG
- 16:40, 29 February 2024 DMansy talk contribs uploaded File:Shoulder.PNG
- 11:31, 29 February 2024 TNicholson talk contribs created page Malware Lab: VM Setup and AWS EC2 (Created page with "The prerequisites for this guide are that you should have two virtual machine instances running on your hypervisor: * Flare VM (Follow this link for setup instructions:https://wiki.elvis.science/index.php?title=Flare_VM_Installation) * Remnux The idea of this lab setup is to be able to detonate live malware on the Flare VM, while using the Remnux VM to observe network traffic. It is also important that we make sure the network is isolated from our host system. The ways...")
- 00:43, 29 February 2024 NSelimovic talk contribs created page File:Flashingimage.png