Digital Forensics & Investigation Workshop with Adiss Ababa University, Information System HUB will be tomorrow @2:00 mata lay.
๐ป If youโre curious about how technology plays a role in solving crimes, this workshop is for you!
See you all there! ๐๐ตโโ
๐ป If youโre curious about how technology plays a role in solving crimes, this workshop is for you!
See you all there! ๐๐ตโโ
Telegram
Information Systems Hub ๐ป๐
ISHub AAU (Information Systems Hub โ AAU) is a student-led tech community at Addis Ababa University open to all tech-enthusiast students, regardless of department.
Contact us
Telegram: @ISHubAAU_Support
Email: ishubaau@gmail.com
Contact us
Telegram: @ISHubAAU_Support
Email: ishubaau@gmail.com
โค7๐ฅ1
Hey fams ๐ Iโm Yeabsira, and Iโm excited to share something Iโve been working on in Cybersecurity especially in Reverse Engineering!
๐ REX โ Reverse Engineering Automation Tool
A powerful tool built to automate static malware analysis and make reverse engineering faster and easier.
Key Features:
๐ Automated static binary analysis
๐ File metadata, entropy, strings, sections
๐ฅ๏ธ Simple GUI + CLI support
โก Fast & lightweight โ built in C and Python
๐ Designed for educational and research purposes only, safe to use and explore.
Check it out here: ๐ GitHub | LinkedIn
๐ REX โ Reverse Engineering Automation Tool
A powerful tool built to automate static malware analysis and make reverse engineering faster and easier.
Key Features:
๐ Automated static binary analysis
๐ File metadata, entropy, strings, sections
๐ฅ๏ธ Simple GUI + CLI support
โก Fast & lightweight โ built in C and Python
๐ Designed for educational and research purposes only, safe to use and explore.
Check it out here: ๐ GitHub | LinkedIn
๐12๐ฅ3
#NEWS
๐จ Cisco flaw already under attack: CVE-2025-20352 lets remote hackers crash systems or run code as root via SNMP.
Cisco IOS & IOS XE devices with SNMP enabled are at riskโMeraki MS390 & Catalyst 9300 included. Patch to IOS XE 17.15.4a now.
Full story: https://thehackernews.com/2025/09/cisco-warns-of-actively-exploited-snmp.html
Telegram | LinkedIn
๐จ Cisco flaw already under attack: CVE-2025-20352 lets remote hackers crash systems or run code as root via SNMP.
Cisco IOS & IOS XE devices with SNMP enabled are at riskโMeraki MS390 & Catalyst 9300 included. Patch to IOS XE 17.15.4a now.
Full story: https://thehackernews.com/2025/09/cisco-warns-of-actively-exploited-snmp.html
Telegram | LinkedIn
โค2
Forwarded from Information Systems Hub ๐ป๐
๐ Workshop Recap
Our Digital Forensics & Cyber Investigation workshop was a huge success! ๐
A big thank you to Nehimya Mesfin for sharing his expert insights on tracing hackers, analyzing digital evidence.
The session was hosted by Eyerusalem Belay , who guided participants through interactive discussions and Q&A.
๐ก Key Takeaway:Forensics is more than solving cybercrimesโitโs about combining technology, ethics, and critical thinking to protect and secure our digital world.
Thank you to everyone who joined and made this session truly impactful! ๐
Our Digital Forensics & Cyber Investigation workshop was a huge success! ๐
A big thank you to Nehimya Mesfin for sharing his expert insights on tracing hackers, analyzing digital evidence.
The session was hosted by Eyerusalem Belay , who guided participants through interactive discussions and Q&A.
๐ก Key Takeaway:Forensics is more than solving cybercrimesโitโs about combining technology, ethics, and critical thinking to protect and secure our digital world.
Thank you to everyone who joined and made this session truly impactful! ๐
๐ฅ2โค1
Forwarded from Information Systems Hub ๐ป๐
๐ฅ Missed the session? Donโt worry! We have a video recording available for you to catch up.
๐ค2โค1
๐ To the burnouts and endless classes!๐
Melkam yetemert gize class lejemerachu hulu ๐ฅ
Melkam yetemert gize class lejemerachu hulu ๐ฅ
๐ฅ14
#AdwaCTF #Adwa_Night
๐จโ๐ป Get ready... a little fun is waiting for you at the end of this week! ๐ฅ๐ฅ
Telegram | LinkedIn
๐จโ๐ป Get ready... a little fun is waiting for you at the end of this week! ๐ฅ๐ฅ
Telegram | LinkedIn
๐ฅ10โค3๐2
Forwarded from INSA Cyber Talent Center
แจCTF แแตแตแญ แฅแช!
แจแขแแแญแแฝแ แแจแฅ แฐแ แแแต แ แตแฐแณแฐแญ (แขแแฐแ )
6แแ แแแญ แ แแ แจแณแญแ แญ แฐแ แแแต แแญแ แแญแแซแต แ แแตแจแ แจแฐแแแ แจCapture The Flag (CTF) แแตแตแญ!!
แจแณแญแ แญ แฐแ แแแต แญแ แแตแแ แจแแแตแนแ แต แฅแ แจแแแฝ แจแแญแ แฃแแแซแแฝ แแญ แจแแแณแฐแฉแ แต แแตแจแญ !!
แญแแณแฐแฉ! แญแธแแ!
แแแแแแฅแก- แจแณแฝ แซแแแ QR แฎแต แตแซแ แซแตแญแ
แฆแณ แจแขแแแญแแฝแ แแจแฅ แฐแ แแแต แ แตแฐแณแฐแญ (แขแแฐแ ) แ แ แซแ
แแ แฅแ แแต 1/2018แ.แ
แจ แ แแฑ 2แก 30 แ แ แซแ
แจแขแแแญแแฝแ แแจแฅ แฐแ แแแต แ แตแฐแณแฐแญ (แขแแฐแ )
6แแ แแแญ แ แแ แจแณแญแ แญ แฐแ แแแต แแญแ แแญแแซแต แ แแตแจแ แจแฐแแแ แจCapture The Flag (CTF) แแตแตแญ!!
แจแณแญแ แญ แฐแ แแแต แญแ แแตแแ แจแแแตแนแ แต แฅแ แจแแแฝ แจแแญแ แฃแแแซแแฝ แแญ แจแแแณแฐแฉแ แต แแตแจแญ !!
แญแแณแฐแฉ! แญแธแแ!
แแแแแแฅแก- แจแณแฝ แซแแแ QR แฎแต แตแซแ แซแตแญแ
แฆแณ แจแขแแแญแแฝแ แแจแฅ แฐแ แแแต แ แตแฐแณแฐแญ (แขแแฐแ ) แ แ แซแ
แแ แฅแ แแต 1/2018แ.แ
แจ แ แแฑ 2แก 30 แ แ แซแ
INSA Cyber Talent Center
แจCTF แแตแตแญ แฅแช! แจแขแแแญแแฝแ แแจแฅ แฐแ
แแแต แ แตแฐแณแฐแญ (แขแแฐแ ) 6แแ แแแญ แ แแ แจแณแญแ แญ แฐแ
แแแต แแญแ แแญแแซแต แ แแตแจแ แจแฐแแแ แจCapture The Flag (CTF) แแตแตแญ!! แจแณแญแ แญ แฐแ
แแแต แญแ
แแตแแ แจแแแตแนแ แต แฅแ แจแแแฝ แจแแญแ แฃแแแซแแฝ แแญ แจแแแณแฐแฉแ แต แแตแจแญ !! แญแแณแฐแฉ! แญแธแแ! แแแแแแฅแก- แจแณแฝ แซแแแ QR แฎแต แตแซแ แซแตแญแ แฆแณ แจแขแแแญแแฝแ แแจแฅโฆ
Adwa CTF "Hack Night" is postponed to the next week #Friday due to INSA's CTF program.
Good Luck for all participants!! ๐ฅ๐ช๐น
#AdwaCTF #HackNight
Good Luck for all participants!! ๐ฅ๐ช๐น
#AdwaCTF #HackNight
๐8
#AWARENESS
How to Defend Phishing Attack ๐จโ๐ป
Phishing attacks target your "trust". Criminals pretend to be banks, your insurance company, or colleagues to steal your sensitive data and money.
๐Why it Matters?
โข One click can give hackers access to your accounts
โข They use stolen info to move money, steal identities, or blackmail you
โข Most breaches start with a phishing message
๐How it Happens?
โข You get a message that looks real and urgent
โข It asks you to click a link, open a file, or confirm details
โข The fake site captures your login info or infects your device
โ How to Protect yourself?
โข Verify the senderโs source address or number
โข Do not click links from unexpected messages
โข Go directly to official websites to cross-check
โข Never share your passwords or OTPs
"Stay Alert. Think Before you Click!"
Telegram | LinkedIn
How to Defend Phishing Attack ๐จโ๐ป
Phishing attacks target your "trust". Criminals pretend to be banks, your insurance company, or colleagues to steal your sensitive data and money.
๐Why it Matters?
โข One click can give hackers access to your accounts
โข They use stolen info to move money, steal identities, or blackmail you
โข Most breaches start with a phishing message
๐How it Happens?
โข You get a message that looks real and urgent
โข It asks you to click a link, open a file, or confirm details
โข The fake site captures your login info or infects your device
โ How to Protect yourself?
โข Verify the senderโs source address or number
โข Do not click links from unexpected messages
โข Go directly to official websites to cross-check
โข Never share your passwords or OTPs
"Stay Alert. Think Before you Click!"
Telegram | LinkedIn
โค3๐2
๐จ Imagine you received this email:
"Your account has been flaged for suspicious activity. Please login immediately to verify your identity or your account will be suspended. [Click here]" What would you do?
"Your account has been flaged for suspicious activity. Please login immediately to verify your identity or your account will be suspended. [Click here]" What would you do?
Anonymous Poll
4%
A. Click the link right away to protect my account
66%
B. Check the senderโs email address first
4%
C. Ignore it -- it's probably fake
26%
D. Report it as phishing and delete it
#AWARENESS
Password Safety & 2FA ๐
Many lose accounts due to weak or reused passwords. Hackers donโt always break in; they log in with your own password. ๐จโ๐ป
๐How Hackers Get Your Password:
โข Guessing simple ones: โ12345678,โ โpassword123โ
โข Buying leaked passwords
โข Phishing with fake emails/links
๐Why Itโs Dangerous:
โข One password can risk all accounts
โข Hackers can reset passwords via email
โข They can read messages, steal money, or impersonate you
๐How to Create a Strong Password:
โข Use 12+ characters
โข Mix letters, numbers, and symbols
โข Avoid names, birthdays, or obvious patterns like โpassword123โ
โ Use a Password Manager:
โข Stores and generates strong passwords
โข Checks weak passwords
โ Turn on 2FA:
โข Adds a second login step
โข Even with your password, hackers canโt log in without the code
"A strong password keeps you safe. 2FA makes you safer."
Telegram | LinkedIn
Password Safety & 2FA ๐
Many lose accounts due to weak or reused passwords. Hackers donโt always break in; they log in with your own password. ๐จโ๐ป
๐How Hackers Get Your Password:
โข Guessing simple ones: โ12345678,โ โpassword123โ
โข Buying leaked passwords
โข Phishing with fake emails/links
๐Why Itโs Dangerous:
โข One password can risk all accounts
โข Hackers can reset passwords via email
โข They can read messages, steal money, or impersonate you
๐How to Create a Strong Password:
โข Use 12+ characters
โข Mix letters, numbers, and symbols
โข Avoid names, birthdays, or obvious patterns like โpassword123โ
โ Use a Password Manager:
โข Stores and generates strong passwords
โข Checks weak passwords
โ Turn on 2FA:
โข Adds a second login step
โข Even with your password, hackers canโt log in without the code
"A strong password keeps you safe. 2FA makes you safer."
Telegram | LinkedIn
โค2