• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Loi Van Tran

Insider Threats

September 18, 2016 by Loi Van Tran 2 Comments

A recent research provided from Imperva explained that one in every fifty employees is a malicious insider.  This reaffirms Gartner’s research that the insider is not just disgruntled employees leaving the organization.  Departing disgruntled leaving an organization is often anticipated, but the article warns that attention should also be rendered to current employees who sells information as a secondary source of income.

Impreva’s research, reviewed 140 security incidents and quizzed 250 UK based IT professionals which showed that these insider threats can have severe impacts on the organization.  These events include theft or dissemination of confidential data, indemnity theft, loss of productivity and damage to equipment and facilities.  The study showed that the biggest threat to enterprise security is the people that’s already on their payroll.

It also provides some mitigation and detecting techniques such as proper data classification, storage, and processes involving sensitive data.

Source: http://www.infosecurity-magazine.com/news/1-in-50-employees-a-malicious/

USB Kill v.2.0

September 10, 2016 by Loi Van Tran Leave a Comment

A Russian researcher, Dark Purple, along with a Hong Kong-based technology manufacturer is selling a USB thumb drive called USB Kill 2.0 for $49.95.  The thumb drive is design to send a power surge to a computer that it’s plugged into, frying major computer components and making data retrieval impractical.

The company claims that the thumb drive wasn’t design to erase data, but depending on the hardware configuration (SSD vs. HDD) the USB Kill 2.0 may damage the controllers enough to make access to data on the computers difficult.  It also claims that the device was designed for companies to test their security against USB Power Surge attacks and to prevent data theft via “Juice Jacking.” The device can be set to use with only authorized computers and if it’s plugged into an unauthorized computer, the device will discharge 200 volts DC power over the data lines of the host machine.

Although the company did not design the device for malicious intent, people will now have another way to attack organizations.  The device could be used maliciously by disgruntled employees by using the devices to take out critical servers and computers by simply plugging in the device.  Cyber criminals could also use the device to fry their own computers to keep data away from law enforcement.

http://thehackernews.com/2016/09/usb-kill-computer.html

There’s also a demonstration of the device provided with the article.

A Password for my Password

September 3, 2016 by Loi Van Tran

Is it me or does it seem like we are accumulating more and more passwords everyday.  From work to school to our personal life, we are constantly creating new accounts and passwords that we have to remember.  The world is online and with it a requirement to create an account with every site you visit.  We have accounts for basically everything we need; online banking, shopping, gaming, social networks, educations, mobile apps, loans, mortgages, and privileged account for systems at work.  How do we remember it all? As a student in the ITACS program, we know better than to write it down or even worst, put it on a sticky note under our laptop.   Fortunately for us, some systems may have Single-Sign on, like mobile apps where you can sign on using your Facebook account, or Two-Factor Authentication where we have to carry a physical device. At the end of the day we still have to remember some passwords and of course we do not want to use the same passwords for every account.  To add on to this problem, passwords requirements are becoming more complex.  Rules such as 1 upper case, 1 lower case, special characters, and no dictionary words makes it even more difficult to remember passwords.

There are programs out there like Secure Password Manager, or Keeper that allows you to store your passwords with another password which doesn’t seem to solve our issue.  What happen if these service providers get hacked, now all of our accounts are at risk.  I’ve recently read an article that made REMEMBERING password a little easier.  It basically said to think of a sentence and use that sentence to help create a password that you can remember while meeting password criteria.  For example: I bought my daughter first dog for 200 dollar .  My password would be “Ibmd1stdf200$”  By using the first letter of each word and replacing first with “1st,”  I am able to create a password that meets all the password criteria.  It’s a simple tip, but I never thought about it until I read this article.

Please see the article for more details: http://www.businessinsider.com/hacker-strong-pass-2016-5?pundits_only=0&get_all_comments=1&no_reply_filter=1

  • « Go to Previous Page
  • Page 1
  • Page 2

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in