Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
talk_ccc_hackerkultur_itsec
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Deploy
Releases
Model registry
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Heiko (Entropia)
talk_ccc_hackerkultur_itsec
Commits
cdcb2e34
Commit
cdcb2e34
authored
9 years ago
by
Heiko Reese
Browse files
Options
Downloads
Patches
Plain Diff
…
parent
0b643ffb
No related branches found
Branches containing commit
No related tags found
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
slides/demo/_smtp_demo.txt
+2
-2
2 additions, 2 deletions
slides/demo/_smtp_demo.txt
slides/index.html
+17
-1
17 additions, 1 deletion
slides/index.html
with
19 additions
and
3 deletions
slides/demo/_smtp_demo.txt
+
2
−
2
View file @
cdcb2e34
...
@@ -2,10 +2,10 @@ telnet smarthost.kit.edu 25
...
@@ -2,10 +2,10 @@ telnet smarthost.kit.edu 25
EHLO linux.scc.kit.edu
EHLO linux.scc.kit.edu
MAIL FROM: demo@heiko-reese.de
MAIL FROM: demo@heiko-reese.de
RCPT TO:
XXX
RCPT TO:
Frank.Jansen@StAKarlsruhe.Justiz.bwl.de
DATA
DATA
From: Stabsstelle Mitarbeiterfoerderung <rp@stakarlsruhe.de>
From: Stabsstelle Mitarbeiterfoerderung <rp@stakarlsruhe.de>
To:
XXX
To:
Frank Jansen <Frank.Jansen@StAKarlsruhe.Justiz.bwl.de>
Subject: Sie sind gefeuert!
Subject: Sie sind gefeuert!
Bitte raeumen Sie ihre Buero bis heute 18:00.
Bitte raeumen Sie ihre Buero bis heute 18:00.
...
...
This diff is collapsed.
Click to expand it.
slides/index.html
+
17
−
1
View file @
cdcb2e34
...
@@ -333,7 +333,7 @@
...
@@ -333,7 +333,7 @@
<li>
Informationen sammeln, Zielsysteme identifizieren
</li>
<li>
Informationen sammeln, Zielsysteme identifizieren
</li>
<li>
Analyse Zielsystem (Portscan, Fingerprinting)
</li>
<li>
Analyse Zielsystem (Portscan, Fingerprinting)
</li>
<li>
Schwachstellenanalyse (vulnerability scan)
</li>
<li>
Schwachstellenanalyse (vulnerability scan)
</li>
<li>
Ausnutzen von Schwachstellen (exploit
ing
)
</li>
<li>
Ausnutzen von Schwachstellen (exploit)
</li>
</ol>
</ol>
</section>
</section>
...
@@ -411,6 +411,22 @@ Nmap done: 1 IP address (1 host up) scanned in 2.80 seconds
...
@@ -411,6 +411,22 @@ Nmap done: 1 IP address (1 host up) scanned in 2.80 seconds
data-separator-notes=
"^Note:"
>
data-separator-notes=
"^Note:"
>
</section>
</section>
<section>
<section>
<h2>
Digitale Forensik
</h2>
<span
class=
"fragment"
>
<h3>
Kernfragen an digitale Erkenntnisse/Beweise
</h3>
<ul>
<li>
Erkenntnisgüte
</li>
<li>
Attributierbarkeit
</li>
<li>
zeitliche Veränderung
</li>
<li>
strukturelle Grenzen
</li>
</ul>
</span>
<!-- TODO: artefakte zum diskutieren auflisten -->
</section>
</section>
</div>
<!-- end slides -->
</div>
<!-- end slides -->
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment