Presenting Security Threats Today.
Preparing You for Tomorrow.
→ HypothesisCreate a starting point.
AttacksDetail attack types.
MythsSpecify the myths to bust.
TestsDemonstrate attacks & outcomes.
DiscoveriesPresent findings & alternatives.
ConclusionDetermine myth or fact.
Type of Attacks
Distributed Denial of Service
A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. It overloads the server with fake packets so real users cannot access the resource.
Rubber Ducky Keystoke Injection
A Keystroke Injection Attack Tool ("Rubber Ducky") is a specially designed USB device, often disguised as a thumb drive, that automatically runs code on any host computer into which it is plugged.
A Deauthorization Attack is a Denial of Service attack that disrupts communication between a user and wireless access point. It exploits management frames that are normally used to maintain the link between the two devices.
Demonstration of Attacks
Files on Github.