📂Briefing
Linux & OSINT
What do the hackers in the movies type into their computers?
What are the commands that they smash into terminals?
Though terminals may seem something that only hackers are specialized in, commands entered into computer terminals are actually common tools used by software developers and anyone wanting to be speedy and efficient with their computers.
😮Case 1: Exposed FilesIf you looked, what could you find online?
The internet is bigger than we could ever imagine; what could you find there?
Every day, people post and create information on the internet. Sometimes, they forget that this information is public and accessible to anyone who can find it. What are the dangers behind this, and how can you protect yourself?
Bonus: Social Engineering
🔓Case 2: Vulnerable PeopleLast updated