• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Week 09: Malware

Temple student: I used Target gift card to get past security in 9 buildings

October 24, 2016 by Brent Easley 5 Comments

http://www.philly.com/philly/blogs/real-time/Temple-student-says-she-used-a-Target-gift-card-to-enter-9-campus-building.html

 

Since we were on the subject of social engineering of last weeks class.  I thought this was an interesting article dealing with the university that we all attend.  This is a case of a student using her Target gift card to get pass security. The student acted like she belonged and she was able to not get security to really look to see if she had an ID, which is needed to get in most of the buildings on campus.

Want to make your own app? There are free classes for that

October 23, 2016 by Roberto Nogueda 1 Comment

Hello class- while looking for something to write about I came across this article and thought I should share with you.

The New York Times has a Tech Tip section, and this week’s part by J.D. Biersdorfer walks us through the opportunities and challenges of creating apps for different technologies, even if you’ve never studied computer programming. It also provides interesting links to explore materials and tutorials for online exercises on your own pace and time.

Under the Computer Science Education Week link https://csedweek.org/, you can try to code for an hour and expand your horizon with this cool site, watch the 5-minute video and get your 5 minutes of coolness’ for the day.

There are other links available for Apple’s free software, videos and tutorials for learning the Swift language, I was also interested in the coding concepts link and the free Swift Playground app for the iPad platform, but why are you still reading this, click on the link and have fun.

http://www.nytimes.com/2016/10/22/technology/personaltech/want-to-make-your-own-app-there-are-free-classes-for-that.html?ref=technology&_r=0

Euro Bank Robbers Blow up 492 ATMs

October 21, 2016 by Mengxue Ni 4 Comments

492 ATMs across Europe were blown up by thieves in the first half of 2016, as criminals looked to supplement their attempts at infiltrating machines via cyber-attacks. These “cash out” or “jackpotting” attacks typically involve malware which takes control of the ATM’s cash dispensing function to fill the pockets of the cyber criminals. ATM fraud alone cost European lenders €174m (£157m) in the first half of 2016, up from €156m (£141m) a year ago. This new shows criminal gangs increasingly using diverse tactics, and blending physical and online methods, to steal from banks. A report from Kaspersky Lab back in April claimed that almost all ATMs across the globe can be illegally accessed and raided without even the need to install malware – because they’re running outdated technology.

 

Link: http://www.infosecurity-magazine.com/news/euro-bank-robbers-blow-up-492-atms/

Today’s Brutal DDoS Attack Is the Beginning of a Bleak Future

October 21, 2016 by Ioannis S. Haviaras 1 Comment

The DDoS attack on 10/21/16 that took down Dyn wreaked havoc throughout the internet. Many websites like Spotify, Twitter, Paypal and many other sites were down for a significant amount of time. This goes to show that taking down a major DNS supplier can essentially take down a big portion of the internet. If hackers can do this at their own will how can we know for certain that this won’t happen again in the future even worse.

Article: http://gizmodo.com/todays-brutal-ddos-attack-is-the-beginning-of-a-bleak-f-1788071976

  • « Go to Previous Page
  • Page 1
  • Page 2

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in