• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Uncategorized

Burpe Suite Analysis #3–Groupon

December 1, 2016 by Mengxue Ni 1 Comment

Here are my Burpe Suite Analysis for Groupon:

Burpe Suite Analysis–Groupon (PPT)

Excutive Summary

Analysis Report III: Proxy Vulnerability

December 1, 2016 by Mauchel Barthelemy 1 Comment

Below are the contents of my Burp Suite analysis report.

burp-suite-analysis-report-presentation

burp-suite-analysis-report-executive-summary

 

Burp Suite Analysis – Tastykake

November 30, 2016 by Jason A Lindsley 1 Comment

The following is my Burp Suite analysis exercise for Tastykake:

Tastykake Burp Suite Analysis Executive Summary

Tastykake Burpsuite Analysis Presentation

Burp Suite Analysis- Geico

November 30, 2016 by Marcus A. Wilson 1 Comment

Below is my Burp Suite analysis:

Summary

Powerpoint

Blockchain Revolution & Coursera Link

November 30, 2016 by Jason A Lindsley Leave a Comment

Hey everyone,

Here’s a link to the book I was referring to in class.  I’m in the middle of it and really enjoying it.

Also, there is a new course on Coursera that was recently released by Princeton University.  I’ve only started the first video, but it’s much more technical than the book (so far):

https://www.coursera.org/learn/cryptocurrency

Thank you,

Jason

 

Burpe Suite Analysis

November 30, 2016 by Vaibhav Shukla 1 Comment

Analysis 3

burpe-suite-ppt_vaibhav—-Presentation

burpe-suite-summary_vaibhav—-Summary

What Trump can do about Cyber Security

November 30, 2016 by Brent Easley Leave a Comment

The writer of this article focusing on the three areas (energy, telecommunications, and finance) that are vital and vulnerable to cyber attacks that President Elect Trump should immediately address once he officially becomes President.

https://www.bloomberg.com/view/articles/2016-11-30/what-trump-can-do-about-cybersecurity

 

 

Burp Suite Analysis- Comcast Corporation

November 30, 2016 by Brent Easley 1 Comment

burp-suite-analysis – powerpoint

ethical-hacking-burp-suite – word document

 

 

Burp Suite Analysis – Victory Brewing Company

November 30, 2016 by Shain R. Amzovski 1 Comment

victory-burp-suite-presentation

victory-burp-suite-executive-summary

BurpSuite Assignment – Ioannis Haviaras

November 30, 2016 by Ioannis S. Haviaras 1 Comment

BurpSuite Assignment Summary

BurpSuite Assignment Presentation

 

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Interim pages omitted …
  • Page 14
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in