-
El33tsamurai replied to the topic Social-Engineer Toolkit (SET) v1.5 “Convergence Edition” Released in the forum Social Engineering 9 years, 8 months ago
@jsm725 wrote:
The shear number of potential attacks and ease in which SET executes them scares the living crap out of me. You can protect your network all you want, but end users will almost always be the weakest link. Protect your network from your users!!!!
This is why you must have awareness training all the time :-D.
-
lorddicranius replied to the topic LulzSec releases hundreds of confidential documents from AZ police… in the forum Ethical Hacktivism 9 years, 8 months ago
@jsm725 wrote:
How do we protest in the digital era? Is there even such a thing as ethical hacktivism if a “hack” is considered an act of war?
These are very valid questions. This is the main issue I have when people use a black/white definition when it comes to defining “ethical”. I usually find that when people refer to “ethical hacker” t…[Read more]
-
El33tsamurai replied to the topic OSCP vs Hacking Dojo in the forum OSCP – Offensive Security Certified Professional 9 years, 8 months ago
@jsm725 wrote:
Sounds like El33tsamurai has the USB card on the host and not mounted directly to the VM. I just took the OSWP training using a virtual image and an Alpha card. It shows up (when mounted directly to the VM) as wlan0.
Also, definitely look into GNS3. A seriously awesome tool.
I have added and will use it thanks alot.
-
rattis replied to the topic "Breaking In" Pentest Sitcom in the forum Mass Media 9 years, 10 months ago
@jsm725 wrote:
Saw the episode last night. I forced myself to watch the whole thing. I would be surprised if it made it past one more episode. The acting is poor, the dialogue is lame and pretty dirty at some points, and the tech talk is mind numbingly inaccurate. So sad… :'(
I have to watch it later. But from the sound of it, it sounds like…[Read more]
-
hayabusa replied to the topic WPA WPA2 Cracking no longer a problem in the forum Wireless 9 years, 11 months ago
@jsm725 – Personally, I’d strip the pcap down to only the auth packets needed to crack the WPA. Additionally, one would HOPE, anyway, that any IP’s in the pcap are internal, and that there’s nothing publicly indentifiable in there. This is all assuming I use their service, to begin with.
That’s my take, anyway…
@WCNA – agreed, and good t…[Read more]