Submit Search
Upload
He mūrere me te haumarutanga
•
1 like
•
400 views
R
ranginui
Follow
My talk from kiwicon 2038
Read less
Read more
Education
Report
Share
Report
Share
1 of 28
Download now
Download to read offline
Recommended
Simple ams slidedeck
Simple ams slidedeck
Bengmancastro
Introduction to Windows Defender
Introduction to Windows Defender
Reza Ameri
brochure 2016-September (1)
brochure 2016-September (1)
Dan Kunkel
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
B R SOFTECH PVT LTD
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
Muhammad FAHAD
Designing Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree Modeling
ijtsrd
IT Security Presentation
IT Security Presentation
elihuwalker
Cyber tooth briefing
Cyber tooth briefing
Andrew Sispoidis
Recommended
Simple ams slidedeck
Simple ams slidedeck
Bengmancastro
Introduction to Windows Defender
Introduction to Windows Defender
Reza Ameri
brochure 2016-September (1)
brochure 2016-September (1)
Dan Kunkel
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
B R SOFTECH PVT LTD
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
Muhammad FAHAD
Designing Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree Modeling
ijtsrd
IT Security Presentation
IT Security Presentation
elihuwalker
Cyber tooth briefing
Cyber tooth briefing
Andrew Sispoidis
Basics of hacking
Basics of hacking
Ali Asghar Jafari Lari
Network security and viruses
Network security and viruses
Aamlan Saswat Mishra
Ch03 Network and Computer Attacks
Ch03 Network and Computer Attacks
phanleson
Cyber tooth
Cyber tooth
Andrew Sispoidis
Cybersecurity
Cybersecurity
UmairFirdous
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approach
EC-Council
How To Protect Your Computer
How To Protect Your Computer
Dom Cole
Lecture 3.pptx
Lecture 3.pptx
MuhammadRehan856177
A network worm vaccine architecture
A network worm vaccine architecture
UltraUploader
System tThreats
System tThreats
Sunipa Bera
Cyber security
Cyber security
yagyabuttan1
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
Boris Loukanov
Virtualization security
Virtualization security
Ahmed Nour
Trojan horse and salami attack
Trojan horse and salami attack
guestc8c7c02bb
does avast remove malware
does avast remove malware
ssuser1eca7d
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
Lana Sorrels
Introduction To Ethical Hacking
Introduction To Ethical Hacking
Raghav Bisht
Cryptovirology - by Malathi
Cryptovirology - by Malathi
Santhosh Sundar
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
srtwgwfwwgw
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
AashishTanania
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
Dr. Mazin Mohamed alkathiri
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
Marlene Maheu
More Related Content
Similar to He mūrere me te haumarutanga
Basics of hacking
Basics of hacking
Ali Asghar Jafari Lari
Network security and viruses
Network security and viruses
Aamlan Saswat Mishra
Ch03 Network and Computer Attacks
Ch03 Network and Computer Attacks
phanleson
Cyber tooth
Cyber tooth
Andrew Sispoidis
Cybersecurity
Cybersecurity
UmairFirdous
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approach
EC-Council
How To Protect Your Computer
How To Protect Your Computer
Dom Cole
Lecture 3.pptx
Lecture 3.pptx
MuhammadRehan856177
A network worm vaccine architecture
A network worm vaccine architecture
UltraUploader
System tThreats
System tThreats
Sunipa Bera
Cyber security
Cyber security
yagyabuttan1
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
Boris Loukanov
Virtualization security
Virtualization security
Ahmed Nour
Trojan horse and salami attack
Trojan horse and salami attack
guestc8c7c02bb
does avast remove malware
does avast remove malware
ssuser1eca7d
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
Lana Sorrels
Introduction To Ethical Hacking
Introduction To Ethical Hacking
Raghav Bisht
Cryptovirology - by Malathi
Cryptovirology - by Malathi
Santhosh Sundar
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
srtwgwfwwgw
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
AashishTanania
Similar to He mūrere me te haumarutanga
(20)
Basics of hacking
Basics of hacking
Network security and viruses
Network security and viruses
Ch03 Network and Computer Attacks
Ch03 Network and Computer Attacks
Cyber tooth
Cyber tooth
Cybersecurity
Cybersecurity
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approach
How To Protect Your Computer
How To Protect Your Computer
Lecture 3.pptx
Lecture 3.pptx
A network worm vaccine architecture
A network worm vaccine architecture
System tThreats
System tThreats
Cyber security
Cyber security
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
Virtualization security
Virtualization security
Trojan horse and salami attack
Trojan horse and salami attack
does avast remove malware
does avast remove malware
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
Introduction To Ethical Hacking
Introduction To Ethical Hacking
Cryptovirology - by Malathi
Cryptovirology - by Malathi
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
Recently uploaded
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
Dr. Mazin Mohamed alkathiri
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
Marlene Maheu
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
Celine George
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
Nguyen Thanh Tu Collection
An overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
Dabee Kamal
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
ELOISARIVERA8
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
Vivekanand Anglo Vedic Academy
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
Nguyen Thanh Tu Collection
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
leson0603
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
EADTU
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
Nguyen Thanh Tu Collection
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
Nguyen Thanh Tu Collection
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Limon Prince
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
Vishal Singh
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
23600690
MOOD STABLIZERS DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
PoojaSen20
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
AdelaideRefugio
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
male presentation...pdf.................
male presentation...pdf.................
MirzaAbrarBaig5
Recently uploaded
(20)
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
An overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
MOOD STABLIZERS DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
male presentation...pdf.................
male presentation...pdf.................
He mūrere me te haumarutanga
1.
Your custom image here He
mūrere me te haumarutanga Chris & Ian Cormack // Kiwicon 2038AD
2.
Mūrere mūrere - be
clever, intruding to hack, hacker
3.
Haumarutanga haumaru – safe,
risk free security
4.
Wheinga aversary, opponent
5.
He hinonga whakakino
ko tōna whāinga he ārai i tā ngā kaiwhakamahi o te pūnaha whakamuna whakatutuki i ā rātou whāinga.
6.
Whakahōtuhi whakawhiti pae whakahōtuhi –
to script; whakawhiti – across; pae (from paetukutuku - website) – site XSS
7.
Nā tētahi pānekeneke
i tērā whārangi tukutuku, ka hohonitia ngā mana haumaru, ā, ka whakaurua he kuputuhi kē mā te whakahōtuhi whakawhiti pae.
8.
Whakaeke waengarahi whakaeke – attack waengarahi
– intervening space
9.
He momo whakarongo
kōrero tēnei ki ngā whakawhitiwhitinga i waenga i te rorohiko me tētahi tūmau.
10.
Whakaeke pūreirei engaenga whakaeke –
attack (a pā) pūreirei (isolated group) – buffer engaenga – be overflowing
11.
E kī, ko
te āhua nei kua whākamātau tētahi ki te rāweke i te papatono mā tētahi whakaeke pūreirei engaenga.
12.
Whakakore ratonga whakakore –
deny ratonga – service
13.
Koia he whakaeke
tāurungi ka tauwhati i tētahi ratonga tuihono hei whakarite kia kore e wātea ana ki ngā kawhakamahi.
14.
Pūkahatanga pāpori pūkahatanga –
engineering pāpori – social
15.
Te tinihanga i
ngā tāngata ki te whāki mōhiohio muna, whaiaro rānei ka taea te whakamahi mō ngā pūtake māminga.
16.
Hītinihanga hī – to
fish tinihanga – deceive, trick
17.
He momo tinihanga
te hītinihanga e whakataruna ai tētahi nō tētahi hinonga tōtika ia. Ko tāna, he nuka i a koe ki te pāwhiri i tētahi hono.
18.
Whakamātautau ngoto whakamātautau – test,
try out ngoto – to penetrate
19.
I ētahi wā
kua utua ētahi mūrere kia whakamahi whakamātautau ngoto ki te raweke i tētahi pūnaha.
20.
Rēhita tūraru rēhita –
register tūraru – risk
21.
He wāhanga o
tētahi mahere whakahaere tūraru, tērā e āwhina i a koe ki te aroturuki take me te whakatutuki raru ina pupū ake.
22.
Hinu nakahi hinu –
oil; nakahi – snake virus scanner
23.
E ai ki
ētahi he ōrite te whaihua o te pūmanawa patu wheori ki tērā o te hinu nakahi.
24.
Whakahaere tapi whakahaere –
manage, control tapi – patch, repair, mend
25.
Koia tētahi momo
whakahaere pūnaha e riro ai, e whakamātauria ai, e tāutatia ai ngā tapi maha ki tētahi pūnaha rorohiko.
26.
Whakaeke rā ōrite whakaeke
– attack rā – day ōrite – same
27.
He whakaeke ka
uakina i te rā tonu e kitea ai he ngoikoretanga i roto i ngā pūmanawa.
28.
Contacts Ian: @kiwitoa Chris: @ranginui
Download now