Project Report
Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)
Exploiting java vulnerability [CVE-2012-0507 ]
Shmoocon Epilogue 2013 - Ruining security models with SSH
BSIDESLV Secret Pentesting Techniques
Intrusions (vulnerability, exploit) Intrusion phases Reconnaissance (non-technical, technical) – Interrogating DNS, split-horizon DNS Scanning – Learn.
Voice over IP and IP telephony Network convergence – Telephone and IT – PoE (Power over Ethernet) Mobility and Roaming Telco – Switched -> Packet (IP)
Midterm In a Week