-
Scott Radaszkiewicz wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
Click for Article
Peter Romar, one of the FBI’s most wanted hackers has been captured and plead guilty to federal charges. One of the points from the article that really made me pause was what Romar did with […]
-
Scott Radaszkiewicz posted a new activity comment 8 years ago
When talking about deciding whether or not to whitelist or blacklist applications, I think it really depends on the scenario. I have had some experience with these types of tools.
One area where I see a good use for whitelisting applications is at a kiosk type station. If you have a station that is only used for 1 purpose, then…[Read more]
-
Scott Radaszkiewicz wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
I came across this report while searching for something else at work. I thought it would be good to share. It’s 36 pages, so don’t go crazy and read it all!
The survey was given to security professionals a […]
-
Scott Radaszkiewicz commented on the post, F.B.I. Impersonate Journalist and media organizations call foul, on the site 8 years ago
Brent, love this article. The law is always trying to catch up with technology!! Just the nature of the beast. I remember all the controversy surrounding issues such as wireless, VOiP, etc. Is that wire taping, isn’t it? With technology changing so quickly, and law evolving so slowly, there is always going to be that gap!
-
Scott Radaszkiewicz commented on the post, “FAA Advisory Body Recommends Cybersecurity Measures”, on the site 8 years ago
Mengqi, a great article, and like Ahmed said, we often think about cyber security in terms of keeping our data safe. This sheds a great light on the fact that our lives are so engulfed with technology, that many moments of our day are at risk! It’s so very scary to think of what people with ill intent could do. We choose to let technology…[Read more]
-
Scott Radaszkiewicz posted a new activity comment 8 years ago
Jimmy, great article. I’m an iPhone user and have been for many years. I do like the iPhone, but the first thing I do when and update comes out is…..wait 3 weeks before I deploy it! Seems like Apple never gets it right the first time. It’s so very scary when we think about how much of our lives are tied to our phones. Banking, emails,…[Read more]
-
Scott Radaszkiewicz wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
Article Link: http://thehackernews.com/2016/09/yahoo-data-breach.html
The following article discusses a data breach at Yahoo that happened back in 2014. Account information for over 200 Million Yahoo a […]
-
Scott Radaszkiewicz wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
Reconnaissance Document
Reconnaissance Powerpoint
Reconnaissance Video
-
Nice work. What does use of AS 400 tell you? Might want to explore how far out AS 400s are from end of life?
-
AS/400 has been replaced by the IBM Power Solutions since 2008. So I’m hoping that Cabelas is at least up with the latest IBM technology. Either way, it tells me they have been around for a long time, and collecting data for a long time! So, thinking like a hacker, they have YEARS worth of data for me to exploit!
-
-
-
Scott Radaszkiewicz posted a new activity comment 8 years, 1 month ago
This is not a comment on the discuss, but some help with assignment PA 2.1
There are two command syntax errors you want to be aware of. In 5h and 5j, the context name needs to be in quotes.
Original: # ldapadd -x -D cn=Manager, dc=localhost,dc=localdomain -W -f /home/userid/basedomain.ldif
Correct Syntax: # ldapadd -x -D “cn=Manager,…[Read more]
-
Scott Radaszkiewicz wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
Article Link: http://thehackernews.com/2015/12/internet-of-things-search-engine.html
After the presentation last night on Reconnaissance using some Google Tools, I thought it this was a perfect addition. […]
-
Thank you Scott for bringing this to our attention. I will play around with this tool to see what I may be able to find. There are so may tools out there that people can utilize for “Pentests,” it would require a great deal amount of time to know which is really better than another.
-
Right, thanks Scott..this is a great tool. I like how it lists the protocols and ports that are being used.
-
-
Scott Radaszkiewicz posted a new activity comment 8 years, 1 month ago
Ahmed,
I love this article. To me, someone at Yelp is pretty smart. Basically they’re getting bug testing done by all the hackers of the world and they’ll pay you anything they want, up to $15,000!
It’s also great advertising! Way to go Yelp!
Scott
-
Scott Radaszkiewicz posted a new activity comment 8 years, 1 month ago
That’s a great question. The PC answer is that no one ever wants to violate human rights or someone’s personal freedoms. In this case, the UAE used this technology to spy on a human rights activist. let me ask another question, what if this company came to the United States Government and said to them, we have a program that can give you…[Read more]
-
Scott Radaszkiewicz posted a new activity comment 8 years, 1 month ago
I work at a school district. We opened up BYOD 4 years ago. We had many decisions to make. Would we enforce things like Anti-Virus on the machines, updated patches for operating systems, etc. After looking at all the possibilities, we decided our best defense was NO defense. It would be impossible for us to try to enforce those things, even…[Read more]
-
Scott Radaszkiewicz posted a new activity comment 8 years, 1 month ago
I agree that a search warrant should be in place for this type of thing to happen. Unfortunately, living in the technology age, the rules and regulations are always going to be playing catch up. There is will always be that first time some uses technology in a way that no one ever thought, and courts will have to rule on how it should be…[Read more]
-
Scott Radaszkiewicz wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
Article link: http://thehackernews.com/2016/09/usb-kill-computer.html
Wow! Talk about your Super Spy type stuff. (Queue Mission Impossible Theme Music now: https://www.youtube.com/watch?v=XAYhNHhxN0A). […]
-
Scott,
This is an interesting article. The first time I had read about this device was because it was trending on Facebook. Within a matter of seconds, a USB can destroy a computer. The company claimed this is necessary for proper IT security because companies should have their USB ports disabled on public machines. It seems as though Apple is ahead of the game with devices such as this. “However, the only devices not vulnerable to USB kill attacks are recent models of Apple’s MacBook, which optically isolate the data lines on USB ports.” -
Scott,
I read this article as well online. Its interesting to see how some attacks can not just steal personal information but to completely break a system. Someone who wants to do severe damage to a organization’s information could be on a tour of facilities and just sneakily plug this USB into a server causing it to fail. This goes to show that not only information security is a concern but also physical security in an organization.
-
In the past, USB drives are always a device that help virus or malware to get in our computers. This is a $50 USB destroys a $1000 computer. I would say let’s not use USB anymore. Cloud is more convenience and safer to use. Cloud’s password may be breaching too but it won’t destroy your computer at least. Personally, I think USB is old technology that we can abandon now. However, nothing is one hundred percent safe.
-
There is also a less dramatic software version developed as a response to the “Mouse Jiggler”. It detects USB activation and can wipe drives, shout down machines, or any other action the user wishes. Mouse Jigglers are USB devices that mimic slight mouse movement to prevent the activation of screen savers.
Wade
-
-
Scott Radaszkiewicz posted a new activity comment 8 years, 1 month ago
Mengqi, great article. I bought a car a few years back with OnStar, I didn’t want Onstar, but it came with the vehicle for 12 months. The salesman asked me why I didn’t want it. I told them, while it’s great that I can call and have my doors unlocked with the service, or find my missing vehicle, the pessimist in me knows it will be days…[Read more]
-
Scott Radaszkiewicz posted a new activity comment 8 years, 1 month ago
The USB experiment that Bursztein conducted is very interesting. It just goes to point out the fact that the largest security risk to any organization is their employees. Not matter how many firewall’s we put up, how many Pen tests we conduct, the fact is that there is no way to stop that one employee from taking a USB drive and plugging it…[Read more]
-
Scott Radaszkiewicz wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
Article: Students can use the dark web to cheat their way through school
Link: http://www.businessinsider.com/students-can-use-the-dark-web-to-cheat-their-way-through-school-2016-8
I work in education, K […]
-
Scott Radaszkiewicz posted a new activity comment 8 years, 1 month ago
Hi all,
I am Scott Radaszkiewicz. I am a technology professional with over 25 years of experience. I am currently the Director of Technology in New Hope-Solebury School district and have served in this capacity for 11 years. Prior, I was the Network Engineer at Upper Moreland School district, and worked there for 10 years. I graduated with…[Read more]
Yeah its seriously astonishing that it is active since a long time .In 2011, the group targeted multiple entities including The Associated Press, Reuters, Microsoft, Harvard University, CNN, National Public Radio and Human Rights Watch among others .
In case many people don’t realize, this is the sort of unfortunate outcome a simple twitter account hack can produce. I say unfortunate, but this could easily be escalated to catastrophic had multiples major news outlets were hack simultaneously to post something like this. Yes, people would eventually realize the news isn’t real; however, it would have caused preliminary and long lasting impacts on the financial market alone.