• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Temple student: I used Target gift card to get past security in 9 buildings

October 24, 2016 by Brent Easley 5 Comments

http://www.philly.com/philly/blogs/real-time/Temple-student-says-she-used-a-Target-gift-card-to-enter-9-campus-building.html

 

Since we were on the subject of social engineering of last weeks class.  I thought this was an interesting article dealing with the university that we all attend.  This is a case of a student using her Target gift card to get pass security. The student acted like she belonged and she was able to not get security to really look to see if she had an ID, which is needed to get in most of the buildings on campus.

Filed Under: Week 09: Malware Tagged With:

Reader Interactions

Comments

  1. Loi Van Tran says

    October 24, 2016 at 10:38 am

    Thanks for posting this article:

    Complacency is a serious issue when trying to enforce physical security with security guards. The problem with security guards is they are human, they get bored, they get complacent and unless there’s something that makes them “get on their toes,” like pressure from higher management or an actual threat, they would not take it seriously. Even during my time in the military, I’ve seen duty officers falling asleep while on duty or not checking Id’s when required. It gets a little more difficult when you factor in union laborers, which makes it extremely difficult to reprimand for non-performance.

    Log in to Reply
  2. Wayne Wilson says

    October 24, 2016 at 8:50 pm

    Good article, its straight to the point and shows why physical security is an important factor when it comes to cyber security. Once someone gains access to a building mischief can began. You’re only as strong as your weakest link. No matter how great your IT infrastructure is, someone gaining access to a secure area can easily take down your network and cause chaos.

    Log in to Reply
  3. Jason A Lindsley says

    October 25, 2016 at 11:22 pm

    Thanks for sharing this Brent. Let’s sign this student up for the ITACS program!

    Hopefully this student’s efforts and the recent attacks on campus are a good reminder of the importance of strong physical security measures on campus.

    Log in to Reply
  4. Arkadiy Kantor says

    October 26, 2016 at 1:40 pm

    Not surprising, I don’t spend much time on campus but I see the same faces posted at the same entrances and they never seem happy or engaged. While its hard to tell students apart from someone who may be looking to do something bad they will hopefully stop someone who erratic or totally out of place. But I think this type of security is also more of a deterrent than anything else.

    Log in to Reply
  5. Mauchel Barthelemy says

    October 28, 2016 at 7:29 pm

    Social engineering is an important part of Cyber Security and this article is a good example to prove it. Someone used to get away with something similar at the Ambler campus several years ago. The person used to have a red parking sticker from another school on the back of a rear mirror. Therefore, nobody never bothered verifying whether the sticker was authentic since Temple’s required parking sticker was also red at that time. This is something a person could get away with for an entire semester.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in