• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Nessus Scan Report

Nessus Scan Report

October 27, 2016 by 1 Comment

Presentation

Powerpoint

Executive Summary

Nessus Scan Analysis

October 27, 2016 by Marcus A. Wilson 1 Comment

 

http://community.mis.temple.edu/itacs5211fall16/files/2016/10/Nessus-Scan-Analysis-MW.mp4

Slide Deck: nessus-scan-analysis-mw-ppt

Executive Summary: nessus-scan-analysis-executive-summary-mw

 

 

Nessus Vulnerability Scan

October 27, 2016 by Wayne Wilson 1 Comment

https://www.youtube.com/watch?v=WmTwqqIgvWc

nessus-vulnerabilitypowerpoint

nessus-vulnerability-word-report

 

 

Nessus Vulnerability Scan Report

October 27, 2016 by Brent Easley 1 Comment

https://youtu.be/pFqCdjQQPjE

nessus-scan-powerpoint

nessus-scan

 

 

 

Scanning Excersice–Mengxue Ni & Mengqi He

October 27, 2016 by Mengxue Ni 1 Comment

Group member: Mengxue Ni and Mengqi He

  • Video

Nessus Vulnerability Scanning Summary

  • WORD version 
  • PDF version

Nessus Vulnerability Scanning Powerpoint

  • PPT version 
  • PDF version

U.S. Department of Transportation wants carmakers to focus on cyber security

October 27, 2016 by Ioannis S. Haviaras 2 Comments

The NHSTA (National Highway Traffic Safety Administration) has recommended that a set of guidelines titled “Cybersecurity Best Practices for Modern Vehicles” be followed by every automaker. Even though it is not mandatory many people in Washington believe that this should be a mandatory guideline. Since vehicles are becoming more autonomous and the technology inside vehicles are becoming more sophisticated these guidelines should be followed to prevent any unwanted individuals from obtaining sensitive information. These guidelines provide recommendations on wireless interfaces, internal vehicle communications, network ports, protocols, and access to firmware. BMW and Tesla have reported security issues in the past and have been striving to make their cars as safe as possible. Information such as someone’s location, driving habits and even PII can be compromised from a vehicle.

Article: http://www.digitaltrends.com/cars/nhtsa-auto-cyber-security-guidelines/

Week 9 Presentation

October 27, 2016 by Wade Mackey Leave a Comment

intro-to-ethical-hacking-week-9

Nessus Assignment – Ioannis Haviaras

October 26, 2016 by Ioannis S. Haviaras 1 Comment

https://youtu.be/dovGLPsmWdc

Nessus Assignment Paper

Nessus Assignment PowerPoint

Nessus Vulnerability Scan

October 26, 2016 by Vaibhav Shukla 1 Comment

Scanning Exercise

Video

scanning-ppt

summary-pdf

 

Nessus Vulnerability “Pen” Test

October 26, 2016 by Mauchel Barthelemy 2 Comments

Attached is my Nessus Vulnerability “Pen” Test’s analysis report, PowerPoint and video presentation. Feedback and comments are welcomed. Thank you!

mis-5211-analysis-report-2

mis-5211-analysis-report-2-pp

http://community.mis.temple.edu/itacs5211fall16/files/2016/10/MIS5211-Scan-Pen-Test-Presentation-2.mp4
  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • Interim pages omitted …
  • Page 28
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in