• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

U.S. Govt. Hackers Ready to Hit Back If Russia Tries to Disrupt Election

U.S. Govt. Hackers Ready to Hit Back If Russia Tries to Disrupt Election

November 5, 2016 by Mauchel Barthelemy 1 Comment

We are a few days away from the 2016 U.S. Presidential election. It should be no secret to no one that Cyber Security has been amid several controversial topics such as emails and alleged state-sponsored cyber-attacks to influence the results of this year’s presidential election. The Federal Government believes that Russia can be behind recent waves of DDoS attacks which caused internet disruptions in the Northeast region. Multiple major news outlets have now confirmed that the U.S. military has been preparing and is ready to retaliate against any possible cyber-attacks from Russia to disrupt the election next week.

http://www.nbcnews.com/news/us-news/u-s-hackers-ready-hit-back-if-russia-disrupts-election-n677936

 

Week 10 Presentation

November 4, 2016 by Wade Mackey Leave a Comment

intro-to-ethical-hacking-week-10

MySQL – 2 New Exploits Released

November 3, 2016 by Scott Radaszkiewicz 1 Comment

Click for Article

Two new security vulnerabilities have been found in MySql, an opensource database management system.   MySQL is extremely popular and is listed as the #2 world’s most popular database.

One of the flaws allows a hacker to execute code to elevate their user status to a database system user.   This elevation could allow the hacker to gain complete access to all databases on the hacked server. The second flaw allows a hacker to escalate their user privileges to root user.

Patches for these exploits are already available, and users of MySQL are urged to apply them immediately.

Information is King!   And gaining access to information gives anyone the keys to the castle.  So much information is stored in databases about us, it’s scary.   Popular database flaws like this are scary.   It adds one more tool in a hackers toolbox to gain access to our information.   The recent breaches of online accounts and credit card information just goes to reinforce the fact that hackers will always target this valuable information!

 

 

 

 

The Home Depot reportedly ignored warnings from its own cybersecurity team

November 1, 2016 by Wayne Wilson 2 Comments

This article is a perfect example of upper management not taking IT security seriously. Even though this article is 2 years old it shows a blatant act on Home Depot’s part not to address known security issues. Home Depot cyber security team presented concerns to management back in 2008 and they were slow to respond, resulting in 56 million credit cards being compromised four years later. You would have thought after the Target data breech; Home Depot would have tightened up their act.

http://www.theverge.com/2014/9/20/6655973/the-home-depot-reportedly-ignored-warnings-from-its-own-cybersecurity-team

Google discloses major Windows bug

November 1, 2016 by Brent Easley 2 Comments

http://www.theverge.com/2016/10/31/13481502/windows-vulnerability-sandbox-google-microsoft-disclosure

This is a good article for this week’s lesson.  The Google Threat analysis group disclosed a critical vulnerability in Windows in a public post on the company’s security blog.  The vulnerability allows hackers to escape from security sandboxes through a weakness in the win32k system.  Google went public ten days after reporting the bug to Microsoft, before a patch could be deployed.  Google has already sent out a fix to protect users that use Chrome and Windows is still vulnerable.

 

“Microsoft Launches Security Program for Azure IoT”

November 1, 2016 by Mengqi He Leave a Comment

Microsoft has launched a new security program for its Azure cloud platform to help improve customer’s security when they are dealing with the IoT. It is a response to customer requests fro increased security assurances as they deploy IoT products. Microsoft has partnered with security auditors to evaluate customers’ IoT infrastructure, detect security problems, and provide recommendations. Partners so far include Praetorian, Casaba Security, CyberX, and Tech Mahindra. The massive DDoS attacks on Dyn through IoT was a wakeup call for business that vulnerable IoT devices such as webcams, routers, printers and DVRs would easily become the security targets of attackers. IoT product teams struggles a balance between quickly releasing products to market and the risk of insecurity. IT experts said the security issues of IoT requires the entire ecosystem to work together and collaborate to ensure security.

One of the biggest IT news last week was the IoT-Based DDoS Attacks on Dyn. IoT security problems suddenly attracted everyone’s attention. Vulnerable devices in the IoT system with default setting were turned into “bots” under control of a malware to attack DNS. Since IoT products are increasingly used within organizations, their security and privacy issues should be the top concerns of organizations before implementation.

 

Link: http://www.darkreading.com/iot/microsoft-launches-security-program-for-azure-iot/d/d-id/1327350

Recon on Enclara

October 31, 2016 by Arkadiy Kantor 1 Comment

Recon Assignment by Arkadiy Kantor:

recon-assignment Summary

recon-presentation

Video:

https://www.youtube.com/watch?v=_1nvIJbmo_M&feature=youtu.be

ProjectSauron

October 31, 2016 by Loi Van Tran Leave a Comment

A couple of months ago, Symantec and Kaspersky Labs discovered a malware called ProjectSauron or Strider.   It was capable of harvesting passwords of entire networks since 2011.  It had separate modules designed to perform specific functions like stealing documents or recording keystrokes.  It is also highly selective in its target, currently only infecting 36 computers across 7 organizations in 4 different countries (Belgium, Sweden, Russia, and China).  ProjectSauron has been, until recently, undetected by some of the most advanced IDS/IPS systems available.

Symantec and Kaspersky is acknowledging that this may be state-sponsored malware, used for specific targets to gather military intelligence, because of the complexity of the technology used which may have caused millions of dollars to develop.

You can read more here: https://www.rt.com/news/355165-sauron-malware-cyber-espionage/

Shareholders sue companies for lying about breaches

October 31, 2016 by Arkadiy Kantor 1 Comment

This is an interesting twist on disclosing breaches. This can become an interesting conflict for an organization that may need to contain a breach for various reasons while also having an obligation to its shareholders to share the conditions of the organization. This article mentions the most reason case of the pending merger of Verizon and Yahoo. Since Yahoo had just recently disclosed that it had suffered a massive breach it may have a huge financial impact on Yahoo which Verizon did not account for when making an offer.

 

http://www.forbes.com/sites/christopherskroupa/2016/10/27/exposing-litigation-the-hidden-risks-of-cyber-breach/#7930f77c1988

Lost thumb drives bedevil US banking agency

October 31, 2016 by Ahmed A. Alkaysi 2 Comments

A US bank regulator, now retired, who downloaded large amount of data on two thumb drives says that he lost them. The Office of the Comptroller of the Currency, which is part of the Department of Treasury, says that this is a “a major information security incident.” The specifics on the data lost hasn’t been disclosed, but it involved “controlled unclassified information, including privacy information.” The agency discovered this loss by conducting a review on all information downloaded to removable media back in September. This issue would have been avoided if there was a policy in place that restricting data to be downloaded to devices, like most companies are doing now.

 

Link to article: http://www.csoonline.com/article/3137005/security/lost-thumb-drives-bedevil-us-banking-agency.html

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 7
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Interim pages omitted …
  • Page 28
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in