• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Nessus Vulnerability Scan of Metasploitable

Nessus Vulnerability Scan of Metasploitable

October 31, 2016 by Josh Zenker 1 Comment

I ran a vulnerability scan against Metasploitable 2. Here are the results.

https://youtu.be/UfL2TePYnrc

  • Nessus Scan Report (PDF)
  • Presentation (PDF)
  • Executive Summary (PDF)

LinkedIn Could Soon Be Blocked in Russia

October 30, 2016 by Vaibhav Shukla 3 Comments

Vladimir Putin’s government is threatening to shut down business networking site LinkedIn. The threat stems from a recent law in Russia that requires all companies doing business in the country to store their data locally, something that LinkedIn does not do.The decision is driven by the fear about data privacy in the wake of Edward Snowden’s revelations about NSA snooping.

http://fortune.com/2016/10/26/linkedin-russia/

Blood Service Data Leak Could be Australia’s Biggest

October 29, 2016 by Mengxue Ni 2 Comments

The Australian Red Cross Blood Service has apologized after a database backup file containing over one million donor records including highly sensitive information on sexual activity was exposed to the public. What comes with the breach is a partner published 1.74 GB mysqldump file to a publicly facing website with directory browsing enabled. Which means an unnamed researcher was able to find it at random using a simple IP address scan for publicly exposed web servers returning directory listings. The data included over 1.2 million records pertaining to 550,000 blood donor applicants. The information crucially included answers to highly sensitive question on whether the applicant had engaged in “at-risk” sexual behavior over the past year. According to the statement apologizing for the incident, the Blood Service has taken immediate action to resolve the problem and informed the police and Australian Information Commissioner. They have deleted all known copies of the data. It is unclear how long the data was left publicly available, but it contains info on donors who’ve registered between 2010 and 2016.

I think this will definitely affect people who want to donate blood and people who had donated blood before. I would not donate my blood for a while since it may leak my personal information publicly. So the blood donors in Australia will decrease for a time I believe. They need to prepare for it.

 

Link: http://www.infosecurity-magazine.com/news/blood-service-data-leak-australias/

SECURITY October is National Cyber Security Awareness Month: How secure is your enterprise?

October 29, 2016 by Mauchel Barthelemy 1 Comment

October is national cyber security awareness month. According to the author of this article, Mark Kaelin, this is an opportunity for enterprises of all sizes to take time to educate their workforce on lurking cyber security threats. We hold a “Selfies for Security Challenge” at my company in celebration of cyber security awareness this month. This is a selfie contest in which employees take selfies to display how they are protecting the company and our clients. Please share how cyber security awareness month is being celebrated this year if this is something they also do at your company or anywhere else you may know.

 

http://www.techrepublic.com/article/october-is-national-cyber-security-awareness-month-how-secure-is-your-enterprise/

 

Nessus Scan Report

October 28, 2016 by Jimmy C. Jouthe 1 Comment

Assignment Folder

Nessus Scan Presentation – Anthony Fecondo

October 28, 2016 by Anthony Clayton Fecondo 1 Comment

paper: scanning-assignment

video: Video

Nessus Scan – Loi Tran

October 28, 2016 by Loi Van Tran 1 Comment

Executive Summary

PowerPoint

Video

Nessus Scan Analysis

October 28, 2016 by Scott Radaszkiewicz 1 Comment

Executive Summary

Presentation

Video

 

The secret behind the success of Mirai IoT botnets

October 28, 2016 by Shain R. Amzovski Leave a Comment

This article talks about the success of the Mirai DDoS botnets that are made up of IoT devices.  The software enabling them is publically available, which makes it easier for inexperienced hackers to set them loose.  The devices are mostly made up of security cameras, DVRs, and home routers.

An indicator that one of your IoT devices may be infected with Mirai is that the SSH and Telnet ports (22 and 23) are closed. Mirai does that so administrators can’t get in and nobody else can attack the machine in the same way.

 

Article Link

Nessus Scan Analysis

October 27, 2016 by Shain R. Amzovski 1 Comment

Presentation

Executive Summary

Video Presentation

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Interim pages omitted …
  • Page 28
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in