-
Ahmed A. Alkaysi posted a new activity comment 7 years, 8 months ago
My company sends out “fake” phishing attempts to its employees in order to test and educate them. I actually fell victim to this test by opening up a link from someone that tried to add me on Linkedin. Without realizing the email looked suspicious nor reminding myself that my Linkedin account isn’t connect to my work email, I clicked on the link.…[Read more]
-
Ahmed A. Alkaysi wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 8 months ago
A vulnerability in WordPress’ Rest API has been exploited by up to 20 hackers, which has impacted 1.5 million WordPress sites. Majority of these attacks occurred after WordPress disclosed the vulnerability. The v […]
-
Ahmed A. Alkaysi wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 9 months ago
Security firms RedOwl and IntSights have noticed a trend of online black market dealers attempting to recruit “company employees for insider trading and cashing out stolen credit card numbers.” These dealers run […]
-
Ahmed A. Alkaysi wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 9 months ago
A new ransomware, called ‘Charger’ embedded in an Android app threatens to sell the victim’s private info on the black market if they don’t pay. After the user the app, EnergyRescue, the app asks for admin […]
-
Ahmed A. Alkaysi posted a new activity comment 7 years, 11 months ago
I agree. I liked that they continued the services without shutting everything down. Sometimes organization hit the panic button and unplug everything, that is not always the best way to respond. The most important thing is to make sure customers are impacted the least.
-
Ahmed A. Alkaysi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
Russia has been trying to incorporate elements from China’s great Fire Wall. Due to “Yarovaya’s Law”, which requires Russia’s telecom companies to store users’ data for six months and metadata for three years, […]
-
Ahmed A. Alkaysi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
Hi attached is the powerpoint and executive summary for the Burp Suite QVC analysis.
burp-suit-presentation-qvc
burp-suite-executive-summary-qvc
-
Ahmed A. Alkaysi posted a new activity comment 7 years, 11 months ago
I have a feeling Trump will take Cybersecurity more seriously than previous presidents might have. He mentioned that that he will create a Cyber Security review team that assess and recommends improvements to the national cyber infrastructure. Trump hates to lose, and he has admitted that ISIS is beating US in terms of Cyber. Taken all this into…[Read more]
-
Ahmed A. Alkaysi posted a new activity comment 7 years, 11 months ago
This is pretty interesting. I really like this approach in order to mitigate the risk of account hijacking. Exploited passwords will always be available, and someone will pay money in order to get them. By taking a pro-active approach, Facebook gives the user a second chance to protect their profile.
-
Ahmed A. Alkaysi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
A single laptop can take down high-bandwidth enterprise firewall by using an attack known as BlackNurse, which uses ICMP type 3 (destination unreachable) code 3 (port unreachable) packets. It would take between […]
-
Ahmed A. Alkaysi posted a new activity comment 7 years, 12 months ago
What a great initiative from Facebook. Cyber-bullying is an extremely important topic that more people need to take seriously. I hope this will lead to less non-cyber bullying.
-
Ahmed A. Alkaysi posted a new activity comment 7 years, 12 months ago
My company obviously seems phishing as a huge concern, as they provide trainings on it. One of the methods they use in order to bring more awareness to the issue, is that they will test us by using phishing links. For example, the cyber team will send us an email claiming that we have just received a request for an invitation by somebody on…[Read more]
-
Ahmed A. Alkaysi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 12 months ago
Security researchers discovered a couple flaws in Belkin home devices and discussed it during last Friday’s Black Hat Europe conference. These were SQL injection and XSS vulnerabilities, the same ones we d […]
-
Ahmed A. Alkaysi posted a new activity comment 8 years ago
I don’t like how Google went public before Microsoft sent a patch out. This just increases the risk of hackers who might not have known about this to exploit it. Even if they went public, how is the general public going to use this new-found knowledge to defend themselves? I understand that Google has a 7 day policy for vendors to either send a…[Read more]
-
Ahmed A. Alkaysi posted a new activity comment 8 years ago
I agree Loi. In the future Government’s will start to mandate security regulations and start demanding companies do things a certain way to mitigate as much security risks as possible. Government’s number one priority is national security. Cyber security in general pretty much falls into that. If large organizations have security breaches, then…[Read more]
-
Ahmed A. Alkaysi posted a new activity comment 8 years ago
I think these guidelines should definitely be mandatory. As cars and the world get more connected, cyber security needs to be on the forefront. I wouldn’t be surprised if we start seeing “hacking” among the leading cause of car deaths within the next 20 years. Before we allow this to happen, the car companies need to do everything in their power…[Read more]
-
Ahmed A. Alkaysi posted a new activity comment 8 years ago
My company is taking advantage of this month by offering presentations, trainings, and just setting up booths which are attended by different security teams in the lobby. This is a great way to interact with employees and help them understand the importance of cyber security. Another great technique that my company is using, they are sending…[Read more]
-
Ahmed A. Alkaysi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
A US bank regulator, now retired, who downloaded large amount of data on two thumb drives says that he lost them. The Office of the Comptroller of the Currency, which is part of the Department of Treasury, says t […]
-
Ahmed A. Alkaysi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
Hello, the links to the executive summary, powerpoint slides, and video are below. If there are any issues, please let me know. Thanks.
nessus-scan-executive-summary
nessus-scan-ppt
Nessus scan video
-
Ahmed A. Alkaysi commented on the post, Create Your Own MD5 Collision, on the site 8 years ago
This is really cool Loi. Although hash collisions are supposed to be statistically unlikely, people are obviously starting to create them like you have. Maybe other hashing methods that are more than the 128 bit that MD5 outputs need to start being used. Will definitely look into testing this experiment out.
- Load More