-
Josh Zenker wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 7 months ago
I decided to leverage my particular professional skill set with this attack. I was a little surprised at how easy Metasploit made it to gain a root shell on the Metasploitable VM. I was able to perform some of the […]
-
Josh Zenker wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
Malware researchers recently discovered a particularly dastardly new type of ransomware, still under development. It gives its victims the option to either pay up or infect others to get the decryption keys to […]
-
Josh Zenker wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
CNN.com has a reputation among my colleagues in IT for how long it takes to load its front page. I reasoned that it must be pulling in many resources from third party sites. Therefore I thought it would be an […]
-
Josh Zenker wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
I ran a vulnerability scan against Metasploitable 2. Here are the results.
Nessus Scan Report (PDF)
Presentation (PDF)
Executive Summary (PDF) -
Josh Zenker wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
I performed reconnaissance on Hahnemann University Hospital, a major hospital located in Center City Philadelphia. Please see the video presentation and attached PDFs below.
Slide Deck: PDF
Executive Summary: PDF
-
Josh Zenker wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
When I originally posted, I didn’t see that someone already posted the news about CyMotive, so here is a different article that focuses on a study conducted by Tripwire, an industry leader in enterprise-class […]
-
Josh Zenker posted a new activity comment 8 years, 1 month ago
I agree with Jason. The Senators’ motivations seem to be coming from the right place, but their approach is misguided. The Harvard Business Review article doesn’t get into the technical reasons for why giving the government a back door into encryption algorithms is a terrible idea, but it’s worth understanding at least on a surface level.
In…[Read more]
-
Josh Zenker wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
With all the recent concern about the security of Internet-connected cars, it probably comes as no surprise that Volkswagen has formed an automotive cyber security firm with three former members of Israel’s Shin […]
-
Josh, thank you for sharing this article!
It is sounds interesting and new. I didn’t know any cyber crime that related to automotive. But I think since now many cars can also connect on internet, there will be some cyber security problems that need people to notice. If there is a example, I think it will be perfect.
-
This makes me think that since everything is moving to the Internet of Things, each device we have will have its own cyber security company. There will be CyDishwasher, CyCoffee, and CyThermostat. It is important to stay ahead of those who would try to exploit vulnerabilities in devices and systems. At least reduce the danger to them just making the coffee too hot.
-
This is a good initiative, but also a part of Volkswagen’s campaign to repair its image and reputation after being under fire regarding the emissions scandal. It’s a good sign that cyber security is already considered as an area of focus for car companies. Internet-connected and driver-less cars will inevitably become mainstream in the near future. Therefore, it is critical that IT Security grows or evolves with it before it is too late.
-
-
Josh Zenker's profile was updated 9 years, 2 months ago
-
Josh Zenker's profile was updated 9 years, 2 months ago