Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security - New spoofing workshop #70

Open
wants to merge 2 commits into
base: master
Choose a base branch
from
Open

Security - New spoofing workshop #70

wants to merge 2 commits into from

Conversation

SysAdm0
Copy link

@SysAdm0 SysAdm0 commented Nov 23, 2022

Description

Add spoofing workshop subject

Changes include

  • Bugfix (non-breaking change that solves an issue)
  • New feature (non-breaking change that adds functionality)
  • Breaking change (change that is not backwards-compatible and/or changes current functionality)

Checklist

  • I have assigned this PR to myself
  • I have added at least 1 reviewer
  • I have tested this code
  • I have added sufficient documentation in the code

@SysAdm0 SysAdm0 self-assigned this Nov 23, 2022
@RezaRahemtola RezaRahemtola changed the title [ADD] spoofing workshop topic Security - New spoofing workshop Dec 15, 2022

## Setup
!!!! CHECK YOUR EMAIL !!!
The server IP will be given to you by mail in your Epitech account.
Copy link
Sponsor Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why is there Epitech-specific information in the subject?


✔️ Create an evil proxy

## Setup
Copy link
Sponsor Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Add an intro about spoofing, what is it, what will be covered in this workshop...

- Set spoofed masquerade

To get the flag, send your postfix configuration in `/etc/postfix/main.cf` to a PoC Security administrator.</br>
You can send it in `workshop-spoofing@proton.me` with your Epitech email address with the following subject: `SMTP server`.</br>
Copy link
Sponsor Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same for Epitech content

Are the credentials of the workshop-spoofing@proton.me email kept somewhere for future usage ?


Here is a sample scheme of the evil proxy:

![](https://tse2.mm.bing.net/th?id=OIP.mdfWRGSKWIDDqEqd7_BV6gHaDC)
Copy link
Sponsor Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's better to add the images directly in the repository and link to them, it will avoid broken links in the future 😉


All bonus in this workshop will be rewarded in the PoC Security platform.</br>
Don't hesitate to contact a staff member if you have any questions :) </br>

Copy link
Sponsor Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You can also add the authors of the workshop (copy paste what we use for software workshops for example 😄 )

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants