• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Analysis Report III: Proxy Vulnerability

Analysis Report III: Proxy Vulnerability

December 1, 2016 by Mauchel Barthelemy 1 Comment

Below are the contents of my Burp Suite analysis report.

burp-suite-analysis-report-presentation

burp-suite-analysis-report-executive-summary

 

What Trump Can Do About Cybersecurity

December 1, 2016 by Ioannis S. Haviaras 3 Comments

When Trump begins his presendency on January 20th he will be leading a country that has the highest number of ransomware controlled computers in the world. Three areas in which cyber security is critical to our daily lives is energy, telecommunications and finance. These three essential services need to be managed properly to prevent cyber attacks in the future. In Ukraine more then 250,000 people expereicned a black out when hackers infected the power grid with malware. Even though it is in a less economically powerful country such as the United States it goes to show that hackers can infiltrate electrical grids. There is already malware that is present on our power grid that can be used to perform sserious interruptions. Trump needs to take these things into account when his administration hits the ground running on January 20th not only for the safety of our country but also the safety of the globe.

Article: https://www.bloomberg.com/view/articles/2016-11-30/what-trump-can-do-about-cybersecurity

Burp Suite Analysis – Tastykake

November 30, 2016 by Jason A Lindsley 1 Comment

The following is my Burp Suite analysis exercise for Tastykake:

Tastykake Burp Suite Analysis Executive Summary

Tastykake Burpsuite Analysis Presentation

Burp Suite Analysis- Geico

November 30, 2016 by Marcus A. Wilson 1 Comment

Below is my Burp Suite analysis:

Summary

Powerpoint

Blockchain Revolution & Coursera Link

November 30, 2016 by Jason A Lindsley Leave a Comment

Hey everyone,

Here’s a link to the book I was referring to in class.  I’m in the middle of it and really enjoying it.

Also, there is a new course on Coursera that was recently released by Princeton University.  I’ve only started the first video, but it’s much more technical than the book (so far):

https://www.coursera.org/learn/cryptocurrency

Thank you,

Jason

 

Burpe Suite Analysis

November 30, 2016 by Vaibhav Shukla 1 Comment

Analysis 3

burpe-suite-ppt_vaibhav—-Presentation

burpe-suite-summary_vaibhav—-Summary

What Trump can do about Cyber Security

November 30, 2016 by Brent Easley Leave a Comment

The writer of this article focusing on the three areas (energy, telecommunications, and finance) that are vital and vulnerable to cyber attacks that President Elect Trump should immediately address once he officially becomes President.

https://www.bloomberg.com/view/articles/2016-11-30/what-trump-can-do-about-cybersecurity

 

 

Burp Suite Analysis- Comcast Corporation

November 30, 2016 by Brent Easley 1 Comment

burp-suite-analysis – powerpoint

ethical-hacking-burp-suite – word document

 

 

Burp Suite Analysis – Victory Brewing Company

November 30, 2016 by Shain R. Amzovski 1 Comment

victory-burp-suite-presentation

victory-burp-suite-executive-summary

BurpSuite Assignment – Ioannis Haviaras

November 30, 2016 by Ioannis S. Haviaras 1 Comment

BurpSuite Assignment Summary

BurpSuite Assignment Presentation

 

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Interim pages omitted …
  • Page 28
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in