Temple University

Week 12 Reading Summary, Question, and recent Cyber Security News…

  1. Summarize one key point from each assigned reading…

Aircrack-ng.org published an online tutorial regarding the setup of Aircrack-ng (mostly Linux-based wireless networking suite of digital tools [packet sniffer & injector, WEP & WPA/WPA2-PSK cracker & analysis apps] for ethical hacking purposes on one’s owned networks [not other’s networks.])

  1. Question to classmates (facilitates discussion) from assigned reading…

Question: During the Aircrack-ng setup, did you confirm that your computer’s networking card can inject packets via the Injector Test?

Identify, read, and post to our blog a current event article regarding ethical hacking & penetration testing (follow theme topic of the week, or other interesting related article)…

     In the Cyber Security News lately…

Temple University’s on-going digital battle with Phishing email scams with linked Malware & vigilant solutions (example info from recent email attacks on 3/21/2016 at Temple University)…

—————————————————————————————————————

From: NoReply Delivery Notification [mailto:notification-delivery@xxxxxmail.com]

Sent: Monday, March 21, 2016 8:32 PM

To: XXXXX XXXXX <xxxxx@temple.edu>

Subject: Delivery Tracking Information and ETA – see attached invoice (order # 1562648774)

Attached: USPS_DELIVERY_TRACKING_AND_ETA.doc

USPS.com Order #: 1562648774

Hello,

Thank you for your order.
See the attached invoice for package tracking information and estimated time of arrival.

Order #: 1562648774, Placed on: March 18, 2015 9:30:00 AM, Status: Order Placed, Ship to: See attached invoice

—————————————————————————————————————————————————————-

*NOTE: Computer users just had to open the file attachment within this email example, and next a Trojan.Dropper began an install process on client’s Windows PC!

**NOTE: Some of the vigilant solutions examples at Temple University, Computer Services (TUCS) included the following:

  1. notification-delivery@xxxxxmail.com was blocked in Temple-Firewall, etc.
  2. Symantec Endpoint Protection (SEP12.1.6.x Enterprise) with latest SEP definitions did detect & quarantine Trojan.Dropper malware (USPS_DELIVERY_TRACKING_AND_ETA.doc)
  3. TUCS-Client Services then further checked & removed any further Trojan.Dropper malware via SEP12.1.6.x, Malwarebytes in Windows-SafeMode, etc. on reported infected Windows client PCs.
  4. TUCS continued to educate it’s networked computer users via official Temple University email regarding latest & future Phishing email scams, etc.

 

Leave a Reply

Your email address will not be published. Required fields are marked *