• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Week 1: Course Introduction
      • Week 2: Meterpreter, Avoiding Detection, Client Side Attacks, and Auxiliary Modules
      • Week 3: Social Engineering Toolkit, SQL Injection, Karmetasploit, Building Modules in Metasploit, and Creating Exploits
      • Week 4: Porting Exploits, Scripting, and Simulating Penetration Testing
      • Week 5: Independent Study – Perform Metasploit Attack and Create Presentation
      • Week 6: Ettercap
      • Week 7: Introduction to OWASP’s WebGoat application
    • Second Half of the Semester
      • Week 8: Independent Study
      • Week 9: Introduction to Wireless Security
      • Week 10: Wireless Recon, WEP, and WPA2
      • Week 11: WPA2 Enterprise, Wireless beyond WiFi
      • Week 12: Jack the Ripper, Cain and Able, Delivery of Sample Operating Systems
      • Week 13: Independent Study – Analyze provided Operating System Samples and Create Assessment Report
      • Week 14: Deliver Assessment to Operating System Class either in person or via teleconferenc
  • Assignments
    • Analysis Reports
    • Group Project Report and Presentation
  • Webex
  • Harvard Coursepack
  • Gradebook

MIS 5212-Advanced Penetration Testing

MIS 5212 - Section 001 - Wade Mackey

Fox School of Business

Week 11 and 12 Presentations

April 5, 2018 by Wade Mackey 3 Comments

Advanced Penetration Testing -Week-11 Advanced Penetration Testing -Week-12

Filed Under: Week 11, Week 12 Tagged With:

Reader Interactions

Comments

  1. Sheena L. Thomas says

    April 8, 2018 at 8:20 pm

    I often wonder how many companies could have avoided major security breaches if their companies did annual pen testing against their environment? I just found out that one of my favorite department stores had a security breach and they will not be held responsible if fraud activities were to appear on any of their customers accounts.

    https://www.saksfifthavenue.com/include/aem/aem_static.jsp?page=security-information-notice&site_refer=EML

    Log in to Reply
  2. Vince Kelly says

    April 12, 2018 at 9:25 am

    Tech industry completes its standards for banishing passwords
    https://www.engadget.com/2014/12/09/fido-alliance-publishes-specs/

    The FIDO Alliance (Google, Microsoft, PayPal, and others) have just published
    a ‘password free’ standard that works with both single and two-factor authentication
    and relies on the use of sign-in methods other than passwords, (e.g., some fingerprint
    readers, USB dongles, etc.). It may take some time before it becomes accepted as a
    practical alternative to using passwords because it doesn’t support existing authentication
    mechanisms like Apple’s Touch ID fingerprint system or Bluetooth.

    Log in to Reply
  3. Fraser G says

    May 5, 2018 at 3:26 pm

    https://www.silicon.co.uk/security/cyberwar/delta-breach-customer-payment-details-231045

    Another big data leak, this time from Delta. How are the security teams not scrambling at these orgs to find vulnerabilities and fix/patch them? It’s getting to the point where we as consumers don’t really have a choice when using some of these services, and yet we are the losers when companies are irresponsible.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (10)
  • Week 01 (18)
  • Week 02 (9)
  • Week 03 (13)
  • Week 04 (17)
  • Week 05 (12)
  • Week 06 (16)
  • Week 07 (2)
  • Week 08 (8)
  • Week 09 (5)
  • Week 10 (10)
  • Week 11 (5)
  • Week 12 (5)
  • Week 13 (2)
  • Week 14 (7)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in