All public logs

Jump to navigation Jump to search

Combined display of all available logs of Embedded Lab Vienna for IoT & Security. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).

Logs
  • 18:19, 3 January 2024 ALanners talk contribs created page Evil Twin Attack via Kali on Raspberry Pi (Created page with "An Evil Twin is a rogue access point designed to imitate a legitimate access point in order to carry out malicious actions such as phising.Regular laptops and Wi-Fi adapters can be used to set up an Evil Twin, or Raspberry Pis, as these are quite small and can be easily packed into a bagpack when powered by a battery bank. This setup can then be left in one place for several days, for example, during which time the AP can phish information.")
  • 17:47, 3 January 2024 ALanners talk contribs created page Wifipumpkin3 (Created page with "Wifipumpkin3 is a framework for setting up rogue access points and the associated evil twins. The framework is written in Python.")
  • 09:12, 3 January 2024 ALanners talk contribs created page Wifiphisher (Created page with "Bei wifiphisher handelt es sich um ein vollumfängliches Framework, um einen Rogue Access Points aufstellen zu können. Dabei kann das Framework im Zuge von Pen Tests eingesetzt werden, um unter anderem die Wi-Fi Sicherheit zu testen. Gleichzeitig lassen sich mit einem Evil Twin aber auch die personenbezogenen Maßnahmen wie beispielsweise die Security Awareness testen.")
  • 07:52, 3 January 2024 ALanners talk contribs created page File:MITRE ATT&CK Matrix.png
  • 07:52, 3 January 2024 ALanners talk contribs uploaded File:MITRE ATT&CK Matrix.png
  • 07:44, 3 January 2024 ALanners talk contribs created page MITRE ATT&CK (Created page with "==Introduction== Developed by MITRE, ATT&CK is a globally accessible knowledge base focused on adversary behaviour. Cyber adversaries are notorious for their intelligence, adaptability, and persistence, learning from each attack, whether successful or unsuccessful. Their capabilities range from stealing personal information to disrupting critical infrastructure and damaging business operations. The MITRE ATT&CK knowledge-base is freely available to everyone. THE MITRE AT...")