Event

Event
11:15
-
12:15
Day 2
Workshop Network-Security + "Darknet"
not recorded
Assembly-Event
We all have heard about the darknet - but how to navigate to and through it? How to start with the TOR-Browser? We all heard about vulnerabilities - but how do Hackers use these?

FLINTA-only* This one-hour workshop focuses on the secure and responsible use of offensive security tools. We'll take a practical look at Metasploit, Torify, and related tools to understand how to test attack surfaces while maintaining privacy and anonymity.

Together, we'll discuss setting up a small test environment, routing traffic through Tor and proxy chains, and discuss the limits of technical anonymization—including legal and ethical aspects.

Objective: You'll learn how to use Metasploit securely in a lab setup, what Torify can do, and where caution is advised.

Level: Intermediate (basic knowledge of Linux and networking recommended) Duration: Approx. 1 hour What to bring: Laptop with Linux (VM is acceptable), Metasploit, and Tor tools

Assembly