{"version":1,"pages":[{"id":"VmvHJT2zfEE1NHof2xHe","title":"[Youtube : NetworkChuck] AWS S3 intro to cloud hacking (leaky buckets)","pathname":"/","siteSpaceId":"sitesp_rPEN8","description":"[Youtube NetworkChuck]","breadcrumbs":[{"label":"Hacking"}]},{"id":"IQlCgL3BOMEvQCFXFZ6H","title":"[Youtube : NetworkChuck] How to Hack a password // Windows Edition","pathname":"/hacking/youtube-networkchuck-how-to-hack-a-password-windows-edition","siteSpaceId":"sitesp_rPEN8","description":"[Youtube NetworkChuck]","breadcrumbs":[{"label":"Hacking"}]},{"id":"PXwTTLqhbzE83aGhNM1F","title":"Log4J Exploit Demo","pathname":"/hacking/log4j-exploit-demo","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Log4J Exploit]","breadcrumbs":[{"label":"Hacking"}]},{"id":"8VruY9rWJj8owEQfrfrr","title":"Exploitation of a Samsung Galaxy Note 10+ Zero-Click RCE Bug via MMS","pathname":"/hacking/exploitation-of-a-samsung-galaxy-note-10+-zero-click-rce-bug-via-mms","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Exploitation of a Samsung Galaxy Note 10+ Zero-Click RCE Bug via MMS]","breadcrumbs":[{"label":"Hacking"}]},{"id":"je0MLpVwek8jGeTdS6ZM","title":"GPS Spoofing w/ BladeRF - Software Defined Radio Series","pathname":"/hacking/gps-spooging","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [GPS Spooging]","breadcrumbs":[{"label":"Hacking"}]},{"id":"z4j8dOA0vsGhMYDzvoGe","title":"find info on phone numbers with PhoneInfoga","pathname":"/hacking/find-phone-tool","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [PhoneInfoga -Tool]","breadcrumbs":[{"label":"Hacking"}]},{"id":"CuUhvyK90OxZ7CAglmPW","title":"BitWhisper - Jumping the Air-Gap with Heat","pathname":"/hacking/air-gap","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Air-Gap]","breadcrumbs":[{"label":"Hacking"}]},{"id":"QMPMRNhg7lmvB25ZxanV","title":"How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone","pathname":"/hacking/airhopper","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [AirHopper]","breadcrumbs":[{"label":"Hacking"}]},{"id":"tVZHXlJ4qnKHO6sXLbMC","title":"Fake Access Point + DNS SPOOFING (ETTERCAP) + Fake Website","pathname":"/hacking/fake-access","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Fake Access]","breadcrumbs":[{"label":"Hacking"}]},{"id":"Dt8pti6QoVGDPreQABBg","title":"Unlocking L.A.'s Traffic Grid: Phreaked Out (Episode 1)","pathname":"/hacking/iot-1-hacking","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [IoT Hack]","breadcrumbs":[{"label":"Hacking"}]},{"id":"hpNw5nrwpn8rkUhTRFyR","title":"How to Hack a Car: Phreaked Out (Episode 2)","pathname":"/hacking/iot-2-hacking","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [IoT Hack]","breadcrumbs":[{"label":"Hacking"}]},{"id":"gu9B9vabTiP5CxMeLHoA","title":"All The Ways To Hack Your Phone: Phreaked Out (Episode 3)","pathname":"/hacking/iot-3-hacking","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Phone Hacking]","breadcrumbs":[{"label":"Hacking"}]},{"id":"s2jNpG1WKvqUip1jxdnj","title":"Hacking IoT Thermostats","pathname":"/hacking/hacking-iot","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [IoT Hack]","breadcrumbs":[{"label":"Hacking"}]},{"id":"TcMf4jlmLcPuXgNRx6LB","title":"WiFi IoT Hacking Demo Guide","pathname":"/hacking/wifi-hacking","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Wifi Hacking]","breadcrumbs":[{"label":"Hacking"}]},{"id":"NPzZNWV32rKG2PqbdKgp","title":"How to Hack WPA/WPA2 Wi-Fi With Kali Linux Aircrack-ng","pathname":"/hacking/aircrack-ng","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Wi-Fi Hack]","breadcrumbs":[{"label":"Hacking"}]},{"id":"p8k9c569rLoAAoCgcmE2","title":"Exploit CVE-2016-2521 DLL Hijacking Wireshark","pathname":"/hacking/dll-hijacking","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [DLL Hijacking]","breadcrumbs":[{"label":"Hacking"}]},{"id":"LAlbXKzwANYkt3yRi7Ka","title":"CVE-2016-4484 : Ubuntu16.04 Enter 30 to shell: Cryptsetup Initram Shell","pathname":"/hacking/ubuntu16.04-bug","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Ubuntu16.04 Hacking]","breadcrumbs":[{"label":"Hacking"}]},{"id":"hQuvCuOCMwua7ze37DwV","title":"FATMAN CVE-2015-2545 Office 2007 Silent DOC Exploit Domo","pathname":"/hacking/office-doc-exploit","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [DOC Exploit]","breadcrumbs":[{"label":"Hacking"}]},{"id":"20RCebHij12uUURqPFsA","title":"CVE-2016-2384 proof-of-concept exploit demo","pathname":"/hacking/exploit-cve-2016-2384","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Exploit]","breadcrumbs":[{"label":"Hacking"}]},{"id":"oMBqLEpjLnJ1qq88UHrt","title":"Let's See What's Out There - Mapping the Wireless IOT","pathname":"/hacking/wireless-iot","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Wireless IOT Hack]","breadcrumbs":[{"label":"Hacking"}]},{"id":"xzyqO5ialhPojwU7tUib","title":"Kali Linux NetzwerkOrdner cracken mit Hydra","pathname":"/hacking/smb-hydra","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [SMB-Hydra]","breadcrumbs":[{"label":"Hacking"}]},{"id":"NFbLUx9jvFTqBuJcrnNg","title":"MySQL/MariaDB/Percona - Race Cond CVE-2016-6663 & Root PrivEsc CVE-2016-6664 PoC Exploits","pathname":"/hacking/exploit-cve-2016-6663-4","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [CVE-2016-6663 & CVE-2016-6664 : Exploits]","breadcrumbs":[{"label":"Hacking"}]},{"id":"5P7GtPjkGCgQf2cXRqFm","title":"Microsoft Internet Explorer 8, 9, 10, 11 Exploit | CVE-2016-0189","pathname":"/hacking/explorer-8-9-10-11-exploit-cve-2016-0189","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Windows Hacking]","breadcrumbs":[{"label":"Hacking"}]},{"id":"ji35IIDMYv5VIkpd7L3h","title":"MS16-007 CVE-2016-0019 Windows RDP Security Bypass","pathname":"/hacking/rdp-bypass","siteSpaceId":"sitesp_rPEN8","description":"","breadcrumbs":[{"label":"Hacking"}]},{"id":"YzPcB0SbP61tyJnzUlZC","title":"How to Recover Passwords on ZIP Files - fcrackzip","pathname":"/hacking/recover-zip","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [fcrackzip]","breadcrumbs":[{"label":"Hacking"}]},{"id":"vpk1LLNRRZoJ5FzdTcCt","title":"NoSQLMap MongoDB Management Attack Demo","pathname":"/hacking/nosqlmap-mongodb-management-attack-demo","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [NoSQLMAP Attack]","breadcrumbs":[{"label":"Hacking"}]},{"id":"Nu5m0AFEPbLBdBoWdg91","title":"Exploiting JBOSS with JexBoss","pathname":"/hacking/jboss-exploit","siteSpaceId":"sitesp_rPEN8","description":"","breadcrumbs":[{"label":"Hacking"}]},{"id":"hjfp4WW9y4krAEbWemq1","title":"Kali Linux Tools - ATSCAN (Advanced Search & Dork Mass Exploit)","pathname":"/hacking/kali-linux-atscan","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Kali Linux - ATSCAN]","breadcrumbs":[{"label":"Hacking"}]},{"id":"Cd4bCwt0UqUbTPf4qrM1","title":"KADABRA: Automatic LFI Exploiter (all LFI attacks implemented)","pathname":"/hacking/kadavra-automatic-lfe-exploit","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [KADAVRA - Automatic LFE Exploit]","breadcrumbs":[{"label":"Hacking"}]},{"id":"QqZSgRL090ujG1P5zfHL","title":"Hacking with Evilgrade","pathname":"/hacking/evilgrade-hacking","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Evilgrade]","breadcrumbs":[{"label":"Hacking"}]},{"id":"XyfjaMCIeL6aZaWPA68i","title":"Msfvenom Payload Creator(MPC) in Kali Linux","pathname":"/hacking/kali-linux-mpc","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Kali Linux - Msfvenom Payload Creator]","breadcrumbs":[{"label":"Hacking"}]},{"id":"f44HXg0z2xNBNrFwCTeY","title":"OWASP VBScan 0.1.7 introduction","pathname":"/hacking/owasp-vbscan","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [OWASP-VBScan]","breadcrumbs":[{"label":"Hacking"}]},{"id":"qJDARAbF8ammDo61qdPd","title":"Kali Linux Tools - KickThemOut (Kick devices off your network by performing an ARP Spoof attack)","pathname":"/hacking/kickthemout-hacking","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [kali Linux - KickThemOut]","breadcrumbs":[{"label":"Hacking"}]},{"id":"1c5pjZ8TLmsq9a4QCIiQ","title":"Kali Linux Tools - PENTMENU bash script for recon and DOS attacks","pathname":"/hacking/pentmenu-dos-tool","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [kali Linux - PENTMENU]","breadcrumbs":[{"label":"Hacking"}]},{"id":"s3P9n0Xplt5Grj5k0TMH","title":"Kali Linux 2016.2 - Websploit FrameWork","pathname":"/hacking/websploit-tool","siteSpaceId":"sitesp_rPEN8","description":"","breadcrumbs":[{"label":"Hacking"}]},{"id":"0h1WwCSMOANvDimGQKgX","title":"Kali Linux Tools - Miranda","pathname":"/hacking/miranda-tool","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Kali Linux - Miranda]","breadcrumbs":[{"label":"Hacking"}]},{"id":"ao9HDx2cXJUiKXvmMCXo","title":"Kali Linux | Usage Pupy Remote Administrator Tool","pathname":"/hacking/pupy-tool","siteSpaceId":"sitesp_rPEN8","description":"","breadcrumbs":[{"label":"Hacking"}]},{"id":"fLom8la5eEczUDLsLLOW","title":"SearchSploit Guide | Finding Exploits | Kali Linux","pathname":"/hacking/searchsploit-tool","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Kali Linux - SearchSploit]","breadcrumbs":[{"label":"Hacking"}]},{"id":"mMVAjCQL0f0AAfZljBzz","title":"FuzzBunch & MSF ShadowBrokers","pathname":"/hacking/fuzzbunch-tool","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [FuzzBunch & MSF ShadowBrokers]","breadcrumbs":[{"label":"Hacking"}]},{"id":"Irggz9kMQ4jsiKkUgAAz","title":"Kali Linux - BeEF & Linode","pathname":"/hacking/beef-linode","siteSpaceId":"sitesp_rPEN8","description":"","breadcrumbs":[{"label":"Hacking"}]},{"id":"UXKmYZH58EGp5EApvslt","title":"Hiding Behind Android Runtime (ART)","pathname":"/black-hat/art","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [ART]","breadcrumbs":[{"label":"Black-Hat"}]},{"id":"1W2JjxIUZT7usr7pzn74","title":"Hacking a Professional Drone","pathname":"/black-hat/dron-hack","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Drone Hack]","breadcrumbs":[{"label":"Black-Hat"}]},{"id":"vkCAS5ltY1cy1MC2YukX","title":"Bypassing Browser Security Policies for Fun and Profit","pathname":"/black-hat/bypassing-browser-security","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Bypassing Browser Security Policies]","breadcrumbs":[{"label":"Black-Hat"}]},{"id":"smgFmP6Ok0LouAXJplab","title":"Relaying EMV Contactless Transactions Using Off-The-Self Android Devices","pathname":"/black-hat/emv","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [EMV Hack]","breadcrumbs":[{"label":"Black-Hat"}]},{"id":"EkRGDTS0mTreq2R9sFkn","title":"DEF CON 24 - Hacking boarding passes for fun and profit","pathname":"/defcon/defcon24-1","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [DEF CON 24]","breadcrumbs":[{"label":"DEFCON"}]},{"id":"jIfhH1jBf3i6gGtS2vii","title":"DEF CON 24 Internet of Things Village - Elvis Collado - Reversing and Exploiting Embedded Devices","pathname":"/defcon/defcon24","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [Embedded Devices]","breadcrumbs":[{"label":"DEFCON"}]},{"id":"51MgzbPuupEn3FAT59CR","title":"[root-me.org] 시스템 취약점 및 다양한 취약점에 대한 연습할 수 있는 사이트","pathname":"/practice/root-me.org","siteSpaceId":"sitesp_rPEN8","description":"[Root-ME.Org] Web/System Test Site","breadcrumbs":[{"label":"Practice"}]},{"id":"f896y9WK1iNITVSG8awG","title":"Damn Vulnerable Web Services (DVWS) using Docker","pathname":"/practice/damn-vulnerable-web-services-dvws-using-docker","siteSpaceId":"sitesp_rPEN8","description":"[Youtube Data] Public Data - [DVWS using Docker]","breadcrumbs":[{"label":"Practice"}]},{"id":"DsLgDx0QH1Zy5vbLUDfD","title":"[KISA] 2022년도 암호모듈검증(KCMVP) 전문교육 신청·접수 안내","pathname":"/education/kisa-2022-kcmvp","siteSpaceId":"sitesp_rPEN8","description":"[보안/해킹] 무료 교육 공유","breadcrumbs":[{"label":"무료 교육"}]},{"id":"ttctejfq9KbAAxYmQRuN","title":"KISA Secure Report - List","pathname":"/kisa-secure-report/kisa","siteSpaceId":"sitesp_rPEN8","description":"KISA 자료 목차 리스트","breadcrumbs":[{"label":"KISA Secure Report"}]},{"id":"P3ss0b4iu7g1MprT7VkQ","title":"OWASP - List","pathname":"/owasp-top-10/owasp","siteSpaceId":"sitesp_rPEN8","description":"OWASP 자료 목차 리스트","breadcrumbs":[{"label":"Owasp Top 10"}]},{"id":"duYmurieFX8fUXMGUWjt","title":"PRIVACY LAW DATA - List","pathname":"/privacy-law-data/privacy-law-data-list","siteSpaceId":"sitesp_rPEN8","description":"Privacy Law 자료 목차 리스트","breadcrumbs":[{"label":"Privacy-law-Data"}]},{"id":"tkK9CLOatp40gfWObgTK","title":"PRIVACY Administrative-RULE - List","pathname":"/privacy-administrative-rule/privacy-administrative-rule","siteSpaceId":"sitesp_rPEN8","description":"PRIVACY Administrative-RULE 자료 목차 리스트","breadcrumbs":[{"label":"PRIVACY-Administrative-Rule"}]},{"id":"FJSzBQSUUM4O6as5aF8R","title":"Secure Trend Report","pathname":"/trend_report/secure-trend-report","siteSpaceId":"sitesp_rPEN8","description":"보안 동향보고서 모음 자료","breadcrumbs":[{"label":"Trend Report"}]},{"id":"btaUKaTlFqTacEl3baGo","title":"[KISA] ISMS/ISMS-P 관련 정보","pathname":"/kisa-isms-p/isms-p","siteSpaceId":"sitesp_rPEN8","description":"[KISA] 한국인터넷진흥원 ISMS/ISMS-P 정보 (모음 자료)","breadcrumbs":[{"label":"kisa-isms-p"}]},{"id":"qHzhQzFmB3CNjSZGK8Yj","title":"[KISA] PIMS 관련 정보","pathname":"/kisa-pims/kisa-pims","siteSpaceId":"sitesp_rPEN8","description":"[KISA] 한국인터넷진흥원 PIMS 정보 (모음 자료)","breadcrumbs":[{"label":"KISA-PIMS"}]},{"id":"FKTRb5pn8NNDoePX8A3B","title":"피싱 사이트 확인 하는 방법","pathname":"/etc-doc/phishing_find","siteSpaceId":"sitesp_rPEN8","description":"피싱 사이트 확인 하는 방법","breadcrumbs":[{"label":"기타자료"}]},{"id":"dJYEoRbDTfInzte07hJv","title":"[KISA] 랜섬웨어 복구도구 모음","pathname":"/etc-doc/kisa-ransomware_decryption_tools","siteSpaceId":"sitesp_rPEN8","description":"[KISA] 랜섬웨어 복구도구 모음","breadcrumbs":[{"label":"기타자료"}]},{"id":"ZvjGao4Um2f24BbXXwxA","title":"베라크립트(VeraCrypt) 을 이용하여 암호화된 가상 디스크 만들기","pathname":"/etc-doc/veracrypt","siteSpaceId":"sitesp_rPEN8","description":"베라크립트(VeraCrypt) 을 이용하여 암호화된 가상 디스크 만들기","breadcrumbs":[{"label":"기타자료"}]}]}