Главная
Study mode:
on
1
Intro
2
Overview
3
Keep your mouth shut
4
Setup your environment
5
Ten Crack Commandments
6
Why do you need it
7
Hammond
8
Avoid contamination
9
Dont operate from your own home
10
Dont reveal your operational details
11
He was insufficiently paranoid
12
He did good
13
Never contaminate
14
Wormer
15
Plumbing
16
Plumbing is boring
17
Put in place first
18
Personas
19
Butterfly
20
Persona
21
Tor
22
Profiling Information
23
Cover Identity
24
OPSEC Rules
25
Anti Profiling Guidelines
26
Geographic Profiling
27
Buffer Overflows
28
NSA
29
LEO
30
VPNs vs Tor
31
VPN to Tor
32
VPNs which dont keep logs
33
Bitcoins are anonymous
34
InfoSock cartoon
35
Portal
36
ASCII Skills
37
Operation Laptop
38
Operation Phone
39
Additional Tricks
40
Hardware
41
USB
42
Average cost per persona
43
Prepaid credit cards
Description:
Explore operational security (OPSEC) measures for hacktivists in this comprehensive conference talk from the Hack In The Box Security Conference. Learn practical techniques to maintain online anonymity and avoid detection by law enforcement. Delve into OPSEC goals, methodologies, and technologies, enabling you to devise and implement robust security measures. Discover how to combine strong technology solutions with disciplined actions to minimize exposure of protected information. Gain insights from recent hacker indictments and research on surveillance, espionage, and counter-intelligence. Cover topics such as setting up secure environments, creating personas, using Tor and VPNs, handling cryptocurrencies, and implementing hardware security measures. Equip yourself with the knowledge to conduct online operations while minimizing the risk of capture.

OPSEC - Because Jail is for wuftpd

Hack In The Box Security Conference
Add to list
0:00 / 0:00