• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Post a boarding pass on Facebook, get your account stolen

September 23, 2017 by Andres Galarza 2 Comments

Article, courtesy of Hacker News

The article this week is about the dangers of posting too much information online. A gentleman shared a picture of his boarding pass for an upcoming trip. A friend of his was able to use the information posted on the pass to view/modify details like a passport number and travel dates.

 

Filed Under: Week 04: Vulnerability Scanning Tagged With:

Reader Interactions

Comments

  1. Ian Riley says

    September 26, 2017 at 9:36 am

    Barcodes have been an interest in since I first noticed a “shaped” barcode on the side of my Tecate. Like Magstripes, it’s interesting to see how many times a barcode is used as a direct representation of the data that it’s next to. Especially in circumstances where the code might be scanned without verifying against the original.

    If this is of interest to you, I’d recommend the following talk from Defcon 24 about Hacking Boarding Passes:
    https://www.youtube.com/watch?v=qnq0UfOUTlM

    Log in to Reply
  2. Elizabeth V Calise says

    October 1, 2017 at 12:47 pm

    Hi Andres,

    I know I am a bit late responding to your post, but this was a great read! I travel very often ( at least once a month) for either business or personal travel. I am always aware of never plugging my usb in the airports and the rental cars, but I never put any thought into my tickets and how they can be used by a hacker. I am never one to post pictures of my tickets or barcodes to the public, but definitely a good tip about not leaving your paper tickets around and how they should be shredded. Even when I try to think of all the possible ways a hacker could obtain my information, there is still always something new…thanks again!

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in