Security, Hacking & Social Engineering Presentation.

Scot L. Harris webid at cfl.rr.com
Mon Oct 31 14:41:54 UTC 2005


On Mon, 2005-10-31 at 09:26, STYMA, ROBERT E (ROBERT) wrote:
> > 
> > The topics I'm going to cover, in no particular order, are:
> > 
> >   - Sniffers
> >   - Viruses
> >   - Port Scanning
> >   - Fingerprinting
> >   - Unnecessary open ports
> >   - Bad software configuration (web servers, databases, mail 
> > servers...)
> >   - SQL injections
> >   - Buffer Overflows
> >   - Use of google as a information gathering tool.
> >   - Firewalls
> >   - DOS attacks
> >   - Brute force attacks
> >   - Cryptography.
> >   - Cross site scripting
> >   - Man-in-the-middle
> >   - Intrusion Detection Systems
> >   - Honeypots
> >   - Identity Spoofing
> >   - Social Engineering
> >   - Gathering information from trash/rubbish
> >   - Physical security in buildings.  Access to the building, cable
> > sniffing, secure ID's...
> >   -  And more....  ;-)
> > 
> With this list of topics, 
> How many days long is this presentation going to be? 

He is hoping to get enough information for papers to use in his other
classes and for other classmates.  Probably plans to plagiarize the work
anyone sends him and turn it in.  Almost sounds like a business plan
from the dot com days.  :)

If this was a class in social engineering he just failed.  :)

 




More information about the fedora-list mailing list