LY Vandy | Info Sec Manager, CINET Technology 10.00 – 10.30 – “What is Ethical Hacking? SOK Yeng | Managing Director (Cambodia), Prism Information Technology 10.30 – 11.00 – “Choosing the right Website Design & Hosting Provider” by Mr.Ngim Bunny | General Manager, Serving Web Solution 11.00 – 12.00 – Panelist Discussion 12.00 – 13.30 – Break 13.30 – 14.00 – “Wi Fi Hacking” by Mr. Tentative Agenda (Last Update 24/01/2014) 7.30 – 8.40 – Registration 8.40 – 9.00 – Opening Remark “Cambodia Cyber Security 2014” 9.00 – 9.30 – “What you think wrong about Cyber Security” by Mr.

It's important to note that proxychains defaults to use Tor. It directs proxychains to send the traffic first through our host at on port 9050 (the default Tor configuration). If you are not using Tor, you will need to comment out this line.

The command would be as follows: As you can see in the screenshot above, I have successfully scanned through my chosen proxy and returned the results back to me.

In this way, it appears that my proxy scanned and not my IP address.

All of these events increase the possibility of detection.

These systems are designed to accept our traffic and then forward it on to the intended target.

SO Van | Security Researcher 14.00 – 14.30 – “Shell Injection to Executable File” by Mr.

You must have an account to comment. Please register or login here!