All public logs
Jump to navigation
Jump to search
Combined display of all available logs of Embedded Lab Vienna for IoT & Security. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
- 16:48, 5 February 2023 DCiklusic talk contribs created page Penetration Testing (Created page with "== Summary == The Penetration Testing Execution Standard (PTES) defines penetration testing in 7 phases. The PTES technical guidelines contain, in particular, practical suggestions for test procedures and recommendations for security tools. == Requirements == * Operating system: Ubuntu 18.04 bionic amd64 * Packages: git emacs In order to complete these steps, you must have followed Some Other Documentation before. == The seven Phases == === Pre-engagement Inte...")
- 17:59, 27 January 2023 DCiklusic talk contribs created page File:Nmap script vulners.png
- 17:59, 27 January 2023 DCiklusic talk contribs uploaded File:Nmap script vulners.png
- 17:55, 27 January 2023 DCiklusic talk contribs created page File:Nmap output on specific host.png
- 17:55, 27 January 2023 DCiklusic talk contribs uploaded File:Nmap output on specific host.png
- 17:47, 27 January 2023 DCiklusic talk contribs created page Nmap (Created page with "== Summary == Nmap (Network Mapper) is a free and open-source tool for network discovery and security auditing. Nmap can be used to identify hosts and services on a computer network, thus creating a “map” of the network. It can also be used to detect open ports and services, operating systems, and even live hosts on a network. == Description == Nmap uses various techniques such as IP address sweep, TCP and UDP port scans, and other methods to identify hosts and s...")
- 19:19, 8 January 2023 DCiklusic talk contribs created page Log4j (Created page with "== Summary == Log4Shell is a software vulnerability in Apache Log4j2, a popular Java library for logging error messages in applications. It was considered a zero-day vulnerability because malicious actors likely knew about and exploited it before any experts had the chance. The vulnerability enables a remote attacker to gain control over a string and trick the application into requesting and executing malicious code under the attacker's control. As a result, attackers...")
- 19:12, 8 January 2023 DCiklusic talk contribs created page File:Log4j.jpg
- 19:12, 8 January 2023 DCiklusic talk contribs uploaded File:Log4j.jpg