r/ComputerSecurity

▲ 6 r/ComputerSecurity+1 crossposts

Weird situation question - anon zoom participant

I don’t know a lot about scamming / hackers / sketch internet things but I’m wondering what people think of the below situation that happened

Recently at our non profit, we hosted a zoom meeting. It was supposed to be for members of our professional community only.

The meeting didn’t have confidential info however we had one participant register where I had I reached out weeks before to ask them to fill in their info to join our community of practice first, we never heard back so we thought we would accept them to the meeting when they joined and allow rhem to introduce themselves there. They did end up joining the call, However, they chose not to speak during the intros. I even sent a private message asking them to introduce themself and they never answered…

I ended up removing them from the meeting because it felt sketchy and weird

Why would someone want to do something like this? The email handle was [name]@bluestar.website … what could someone want from this ?! The meeting was legit just sharing about our different work and such

And It didn’t bounce when I emailed them……

Any ideas ?! Guesses?!

reddit.com
u/yeetcatz — 1 day ago
▲ 11 r/ComputerSecurity+1 crossposts

Cybersecurity Challenge

My professor gave us a cybersecurity challenge in class. He provided the local IP address of a machine on our school network and said there’s a file containing a password somewhere on the PC. The goal is to learn about enumeration and network security, not to damage anything.

I’m a beginner in cybersecurity and I’d like to know what concepts or tools I should study to approach this kind of challenge in a legal and educational way.

What would be the first steps for reconnaissance and understanding what services are running on the target machine?

reddit.com
u/Johnnasz — 1 day ago