• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Week 10: Web Application Hacking

The secret behind the success of Mirai IoT botnets

October 28, 2016 by Shain R. Amzovski Leave a Comment

This article talks about the success of the Mirai DDoS botnets that are made up of IoT devices.  The software enabling them is publically available, which makes it easier for inexperienced hackers to set them loose.  The devices are mostly made up of security cameras, DVRs, and home routers.

An indicator that one of your IoT devices may be infected with Mirai is that the SSH and Telnet ports (22 and 23) are closed. Mirai does that so administrators can’t get in and nobody else can attack the machine in the same way.

 

Article Link

U.S. Department of Transportation wants carmakers to focus on cyber security

October 27, 2016 by Ioannis S. Haviaras 2 Comments

The NHSTA (National Highway Traffic Safety Administration) has recommended that a set of guidelines titled “Cybersecurity Best Practices for Modern Vehicles” be followed by every automaker. Even though it is not mandatory many people in Washington believe that this should be a mandatory guideline. Since vehicles are becoming more autonomous and the technology inside vehicles are becoming more sophisticated these guidelines should be followed to prevent any unwanted individuals from obtaining sensitive information. These guidelines provide recommendations on wireless interfaces, internal vehicle communications, network ports, protocols, and access to firmware. BMW and Tesla have reported security issues in the past and have been striving to make their cars as safe as possible. Information such as someone’s location, driving habits and even PII can be compromised from a vehicle.

Article: http://www.digitaltrends.com/cars/nhtsa-auto-cyber-security-guidelines/

  • « Go to Previous Page
  • Page 1
  • Page 2

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in