Difference between revisions of "Template:Computer hacking"
Jump to navigation
Jump to search
imported>PBS (link to Black hat (computer security)) |
imported>TrueRoganJosh m (Corrected Kali link) |
||
| (7 intermediate revisions by 2 users not shown) | |||
| Line 30: | Line 30: | ||
* [[DEF CON]] | * [[DEF CON]] | ||
* [[Hackers on Planet Earth]] | * [[Hackers on Planet Earth]] | ||
| + | * [[Security_BSides]] | ||
| + | * [[ShmooCon]] | ||
| heading4 = [[Computer crime]] | | heading4 = [[Computer crime]] | ||
| content4 = | | content4 = | ||
| Line 42: | Line 44: | ||
* [[Payload (computing)|Payload]] | * [[Payload (computing)|Payload]] | ||
* [[Social engineering (security)|Social engineering]] | * [[Social engineering (security)|Social engineering]] | ||
| + | * [[Kali_Linux|Kali]] | ||
| heading6 = [[Hacker culture|Practice sites]] | | heading6 = [[Hacker culture|Practice sites]] | ||
| content6 = | | content6 = | ||
| Line 60: | Line 63: | ||
* [[Host-based intrusion detection system|HIDS]] | * [[Host-based intrusion detection system|HIDS]] | ||
* [[Web shell]] | * [[Web shell]] | ||
| + | * [[Arbitrary code execution|RCE]] | ||
| heading8 = [[Computer security]] | | heading8 = [[Computer security]] | ||
| content8 = | | content8 = | ||
* [[Application security]] | * [[Application security]] | ||
* [[Network security]] | * [[Network security]] | ||
| + | * [[Cloud computing security]] | ||
| heading9 = [[Hacker group|Groups]] | | heading9 = [[Hacker group|Groups]] | ||
| content9 = | | content9 = | ||
| Line 71: | Line 76: | ||
* [[Legion of Doom (hacking)|Legion of Doom]] (defunct) | * [[Legion of Doom (hacking)|Legion of Doom]] (defunct) | ||
* [[Masters of Deception]] (defunct) | * [[Masters of Deception]] (defunct) | ||
| + | * [[LulzSec]] (defunct) | ||
* [[Red team|Red and Blue Teams]] | * [[Red team|Red and Blue Teams]] | ||
| heading10 = Publications | | heading10 = Publications | ||
Latest revision as of 01:33, 6 September 2020
| This article is part of a series on |
| Computer hacking |
|---|
| History |
| Hacker culture & ethic |
| Conferences |
| Computer crime |
| Hacking tools |
| Practice sites |
| Malware |
| Computer security |
| Groups |
|
| Publications |
| The above documentation is transcluded from Template:Computer hacking/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |