Jump to content

Search the Community

Showing results for tags 'cybersecurity'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 6 results

  1. How do hackers take advantage of open ports as a vector for an attack?
  2. Can someone guide me to become a Ethical Hacker. I am just new to this and I know little bit of python and Java. I have always been interested in this field and I am looking forward for a career in it.
  3. Hey there! I am getting started within the coding/cybersecurity/ceh/pentesting world. I have a friend who's very savvy at all things tech, and I know they prize their Hak5 gear because they take it with them literally everywhere, so I figured getting to know this community might be a good place to start and get some direction with the best place to begin learning things whether that's YT, opensource projects, just working toward certs, etc. Thanks in advance for any and all help! a2d
  4. I really want to try and dabble in some Intrusion Prevention System software. But it is out of my expertise field atm. I was wondering what the best IPS software is? Have been trying to learn OSSEC.
  5. GeekPwn cyber contests are debuting at Def Con 26 to extend its mission to fostering a knowledge exchange platform and community for cutting edge security research. These challenges help accelerate new machine learning and IoT applications that enable companies to better fortify their systems and processes. Interested participants can find more details below and register at https://wj.qq.com/s/1343875/57eb. Robot Agent Challenge: August 10 @ 10:00-13:00 | Caesars Palace, Emperors Level Each pre-qualified team will bring a miniature robot designed to infiltrate a room and breach various smart devices on-site. Teams will remotely manoeuvre the robots to evade laser intrusion detectors and surveillance cameras, install a covert listening device, open a safe by entering the password on a keyboard, and retrieve information in target computers. CAAD CTF Contest: August 10 @ 10:00-13:09 | Caesars Palace, Emperors Level Pre-qualified teams will test their image classifiers in six rounds where each team receives a different image to modify for the purposes of tricking another team’s machine learning classifier to mis-classify the image into a specified object of the judges’ choosing. The images are unknown to participants until the contest starts, at which time classifiers will undergo an accuracy test. Concurrently taking place online through September is GeekPwn’s CAAD competition, which comprises of three categories for molding AI into attack and defense algorithms dealing with image classification: non-targeted adversarial attack, targeted adversarial attack, and defense against adversarial attack. Additionally, GeekPwn’s CAAD Village (Flamingo Hotel, Lake Mead | August 10 & 11) will present a selection of AI security talks and demos from industry researchers that highlight methods for manipulating machine learning classifiers.
  6. Are Google URLs truly vulnerable to Open Redirection like explained here https://www.indusface.com/blog/?p=1646 Can it happen to anyone's website?
×
×
  • Create New...