-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 9 months ago
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 9 months ago
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 9 months ago
-
Readings – Key point
To secure web applications is very important to consider the way data input is handled by the system. Software should be developed using standard frameworks and input validation libraries in order to reduce risk.
In-the-news article
Web Attacks Increasingly Launched from Amazon Infrastructure
Web application attacks are growing in volume and duration, and are increasingly being launched from cloud IaaS platforms
Malicious traffic is on the rise – notably SQL Injection attacks, which jumped 10%, and Remote File Inclusion (RFI), which increased by a quarter.
Longer attacks hint at the determination of attackers, willing to invest more resources through longer time to succeed.
Cybercriminals are increasingly using IaaS to launch attacks, which makes it easier for them to carry out longer campaigns.
In fact, 20% of all known vulnerability exploitation attempts originated from Amazon Web Services.
WordPress was named-and-shamed as the platform of choice for web attacks – targeted 24% more times than any all other CMS platforms combined – while PHP apps were hit three times as much by cross-site scripting attacks than .Net.
The US was pegged as the biggest source of web application attacks globally and only topped when it comes to cross site scripting, of which the UK was the main source.
This is the link:
http://www.infosecurity-magazine.com/news/web-attacks-launched-from-amazon/
-
Is your smartphone spying on you?
This news report reveals that the flashlight app on many smartphones is really a piece of malware which may be exfiltrating some of your confidential data.
-
Apple’s iCloud targeted in man-in-the-middle attack in China
http://www.pcworld.com/article/2835995/apples-icloud-targeted-in-maninthemiddle-attack-in-china.html
Following launch of the IPhone 6 in China, their ICloud service began facing a
man-in-the-middle attack in the country. According to a watch dog group it was reported
that there an attempt to steal username and password information. It is assumed by the
the group which monitors China’s censorship practices. -
Key Point From Readings
It is very important to cleanse input data of unwanted characters like those that can escape anticipated input whereby commands can be added to the data which may let the hacker be able to communicate with the database and very possibly cause serious data integrity issues. A programmer may want to check for non alpha/numeric characters and either strip the data of them before processing or notify the user that the input is invalid and in order to continue the fields must be in a proper format. One may even check the input data for words that may act as commands like “Delete, Update, Insert, Select and Truncate” – jut to name a few. -
http://www.scmagazine.com/white-houses-network-shut-down-for-two-weeks/article/380062/
This article speaks about the breach at the White House. It is just interesting to see what is being targeted currently in our society. What does it say for the future?
-
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 9 months ago
-
In news about potential data breach: Nearly 44,000 state retirees may have had their personal data compromised in a security breach, more info. at : http://alturl.com/bjdkw
Also, Survey shows the cost of security breaches is on the rise (no brainer there) but Budgets? Not so much. Read more at: http://alturl.com/hi9tu
-
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 9 months ago
-
http://www.chicagotribune.com/business/breaking/chi-dairy-queen-hacked-20141010-story.html
http://www.americanbanker.com/issues/179_149/how-backoff-malware-works-and-why-banks-should-care-1069180-1.htmlOne key point you took from each assigned reading. (One or two sentences per reading)
Most companies take the attitude of it could not happen to me when it comes to being hacked. The largest point of failure is going to be people for a myriad of reasons. Cybercriminals seem to use variations of the Backdoor virus on retailers POS systems to steal data. Dairy Queen seems to be the most recent in the list of companies compromised at this time. Surprisingly, they have a site that assists customers in identifying the store locations that were known to be compromised.
b. One question that you would ask your fellow classmates that facilitates discussion.
If some POS systems provide the ability to encrypt traffic or send traffic through VPN, why are so many retailers failing to implement small deterrents?
-
Exfiltrating data by using video upload
http://www.darkreading.com/attacks-breaches/in-plain-sight-how-cyber-criminals-exfiltrate-data-via-video-/a/d-id/1316725
This article explains a clever way stolen data is sent out of a system. After a system is breached, the sensitive data is encrypted, divided into packets, and each packet is wrapped in a video file and uploaded to a video sharing service. Then it can be downloaded, unwrapped, and decrypted. This is hard to catch, since it is common to have large video files sent out of a system. -
What is Malware
———————-
Anyone can be a potential Malware creator not just the usual amateur hackers. there are professionals out there who make it their livelihood to bring havoc to anyone anywhere. Reasons include but not limited to: disgruntled employee, data for ransom, stealing from competition’s data for financial. Protecting ones self, one must know how the potentials that malware has on an organization and how they make their way from the ‘infector” to the “infected”. Knowing this, one is more likely to become more cautious in their everyday online/computer tasks.Malware 101 – Virus
————————–
Malware is any program inserted into a system, usually without anyone knowing it until it’s already done it’s duty, which can cause data integrity issues, stop or slow down a system an/or modify and/or delete programs being run within the system/network itself. The most common type of malware is the “virus” which acts as a parasite and duplicates itself to other programs. Many times malware comes through attachments in emails and can release itself onto a system upon the attachment being opened. There are different types of virus’s that create havoc each in their own way. Either way, knowing of a malware’s potential and how it is packaged gives one the knowledge of what to look for so the malware can either be stopped or mitigated before the issue becomes too criticalStaples On Alert After Card-Theft Hack Attack
————————————————————
Link: https://uk.news.yahoo.com/staples-alert-card-theft-hack-attack-123510760–finance.html#yhPw4KeStaples is the next of many big corporations that have had credit card theft. The cause this time, malware. Fraudulent transactions of some cards used at many stores in New Jersey, New York and Pennsylvania. This information was traced by a number of banks. It seems that Staples is taking the necessary steps in notifying the public as well as it’s customers though it doesn’t give much detail on what they are doing as far as future prevention and getting themselves back to a “business as usual” state.
Questions to Ask the Class
————————————1. Do you think that Social Engineering is the harder to control over hardware/software malware issues and in the near to late future do you see these difficulties getting easier or harder as systems become more and more technically oriented?
2. Do you think this is just an isolated incident that the attacks have occurred just in the North East region of the U.S. or do you think that Staples just hasn’t found the existence of this malware on their other systems throughout the rest of the U.S. . . . . . . . yet?
-
In news: Dropbox used for convincing phishing attack: http://www.cso.com.au/article/557732/dropbox-used-convincing-phishing-attack/
-
Article: FCC Slaps Telecos With $10M Fine for Data Breaches
FCC just fined two companies in the US, the reason: “for not properly securing information for 305,000 consumers.”
-
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 9 months ago
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 10 months ago
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 10 months ago
Since some of you have asked. Just a reminder that at a minimum, Nessus and nmap should be utilized for scanning.
-
Spear phishing attempt within the Temple community. Someone sent out an email with links that were supposed to direct students to Blackboard Learn Access or the direct login page for Blackboard at Temple University. This attempt was totally designed to capture credentials from members of the Temple Community.
tuportal.temple.edu (System Status & Notices)
http://systemstatus.temple.edu/system/statusOne key point you took from each assigned reading. (One or two sentences per reading)
The bad guys out there spend considerable effort to know who and how to approach you. Therefore, we should never rush to provide information that would not be attainable by almost any other means.
One question that you would ask your fellow classmates that facilitates discussion.?
Does anyone not employed by Temple Computer Services know how to check for alerts on good to know information like phishing via TUportal?
-
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 10 months ago
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 10 months ago
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 10 months ago
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 10 months ago
-
http://www.fool.com/investing/general/2014/09/28/home-depot-vs-target-diy-centers-data-breach-was-w.aspx
http://www.scmagazine.com/reports-suggest-home-depot-was-hit-by-the-mozart-malware/article/373976/One key point you took from each assigned reading. (One or two sentences per reading)
Lawsuits are rolling in and the word is that the malware was designed specifically to penetrate the Home Depot systems, although there seems to be a disagreement over the uniqueness of the software. Analysts discuss the difference in rebounding stock between the Target breach and Home Depot: Response to the incident and the loss of PIN data.
b. One question that you would ask your fellow classmates that facilitates discussion.?
Are we really starting to become accustomed/numb to having our data stolen?
-
Week 6 – Readings (Sniffing)
Switched networks are not immune to sniffing. There are different techniques to eavesdrop traffic such as ARP spoofing or MAC flooding and replication. All of the them are based on the “man-in-the-middle” principle. The best protection against network spoofing is encryption.
In-the-news article (Forbes):
Hewlett-Packard Designates Printing A First-Class IoT Security Platform
The author says that when we think Internet of Things (IoT), the first thing that probably comes to our mind are FitBits and Nest thermometers, not printers. However, Hewlett-Packard has announced several additions to their printer security platform because this service poses risks to organizations.
The note is split in three topics:
1) Printer security matters: printing is an often overlooked segment of IoT that has great potential risks.
2) Printers now more like PCs and servers: Printers and Multi-Function Devices (MFDs) now have more in common with PCs and servers than the printers of old.
3) HP “gets” security: HP says that it believes that printers, data and documents all need to be addressed as part of an overall corporate security strategy.
Companies are not thinking about all the potential holes that the new IoT economy are about to unleash. Printers, as a mainstay of the corporate workflow for years to come have to be secured against both malicious and accidental security breaches.
This is the link:
-
IN THE NEWS:
Bash Code Injection Vulnerability
https://access.redhat.com/announcements/1210053The Bash code injection vulnerability could allow arbitrary code execution allowing attacker to bypass imposed environment restrictions. Certain services and applications allow remote unauthenticated attackers to exploit this vulnerability by providing environment variable.
Improved patch tackles new Shellshock Bash bug attack vectors
http://www.pcworld.com/article/2688932/improved-patch-tackles-new-shellshock-attack-vectors.htmlA patch was released, but researchers found a new method to bypass it, so another patch was released.
http://www.itnews.com/exploits-vulnerabilities/84263/six-key-defenses-against-shellshock-attacks?source=ITNEWSNLE_nlt_itndaily_2014-09-30
The number of attempts by hackers to compromise computers through the Shellshock vulnerability is rising, but companies have options for defending against attackers.Shellshock is the name given to a set of at least six vulnerabilities in GNU Bash, the default command shell found in Linux, Unix and Mac OS X. The flaws in Bash, which stand for Bourne Again SHell, include CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277 and CVE-2014-6278
-
take away:
“Don’t allow proprietary, insecure application protocols or legacy clear text protocols on your network”This week’s reading talks about switched and non-switched network environments and packet snipping.
Packet snipping tool is a very useful tool to use in tracing and analysing network transmissions and application issues, but in the hands of an intruder attempting to break-in to the company’s network it is a very dangerous tool.
As the article mentions, various methods of attack can be used against the company’s network once the attacker has gathered enough information about the network and devices on the network. IP, ARP table can be spoofed, DNS can be poisoned, all can be used for eavesdropping or launching more (destructive or stealth) attacks on the company’s network. -
Packet Sniffing In a Switched Environment:
It seems no matter how sophisticated a system is, someone always seems to find the smallest flaw in the infrastructure and expose it for all to see as well as doing considerable amounts of damage. Packet sniffing is just one of these methods which allows a hacker to intrude unnoticed. A hacker has the capability of playing “the man in the middle” pretending they are part of a legitimate communication transmission without the other participants finding out. When a hacker does this he/she intercepts the transmission and can either “read” it and then pass it on to the intended receiver, like a spy, or manipulate the transmission and send the intended receiver invalid data. There are a number of tools to use to detect packet sniffing from the time this article was written, many having several weaknesses. The most viable tool according to this article is encryption. IPSec is an example of one of these encryption tools.This is an article which explains the importance of including “air space” to the long list of security threats. Fully equipped drones can sore through the air collecting data emitted from mobile devices serving as entry point wireless networks as well as shoot videos and still pictures.
http://defensesystems.com/articles/2014/08/15/drones-can-hack-wifi-networks.aspx -
It is interesting that I read about packet sniffing on switched and non-switched environment after tinkering with an unmanaged switch. The article talks about the tools used to perform packet sniffing and ways to mitigate the risk of packet sniffing. It tries to give you both ends of the stick so that a penn.tester or an auditor is aware of what to expect when working to test the environment. As Nelson pointed out, packet sniffing tools can be a boon and a curse at the same time, depending on who is using it. One of the ways to mitigate is to use encryption.
Based on info. from our Secure Digital Infrastructure class, I am wondering what kind of encryption would best mitigate the threat. Would it be a symmetric encryption or asymmetric encryption?
In news: Hackers charged with Call of Duty theft: http://www.joystiq.com/2014/09/30/hackers-charged-with-xbox-one-valve-call-of-duty-data-theft/
-
Self-protecting Java applications
http://www.darkreading.com/application-security/how-a-major-bank-hacked-its-java-security/d/d-id/1316216?
http://www.waratek.com/Waratek/media/SiteMedia/Documentation/DataSheet-Waratek-Application-Security-vs-3.pdfBy implementing a protocol of Runtime Application Self Protection (RASP), Deutsche Bank is able to protect its Java applications, even the ones which are old and cannot be upgraded or patched. The tool they used runs within the Java Virtual Machine (JVM), making an application level defense which protects all the varieties of Java applications they use.
Sniffing
A common misperception is that a switched environment is more secure than a non-switched environment against packet sniffing attempts. This article details the methods and tools used in both environments.
The key technique used in a switched environment is to implement a ‘man-in-the-middle’ machine which pretends to be the machine which each of the other machines is talking to. It does this by changing the MAC address in the sending and receiving machines to its own MAC address. It then intercepts and sends on the messages from each machine.Question:
It was stated in the article that the ultimate solution to network sniffing is encryption. What is the cost (implementation and in performance) of encrypting everything in the network? -
My article was about a group of hackers that utilized an SQL injection to get into U.S. Army databases and Microsoft. What worries me about this type of news is that the information they stole was worth about $100-200 Million dollars, but look to sell this information on Ebay for $5,000. Three of the hackers were under the age of 22. It seems that attackers are becoming younger and smarter. As age groups that can conduct attacks against such high profile targets as Microsoft and the Army become younger what does the future hold? Most of the next generation growing up now will have never lived in a world without a computer. So if are having trouble handling small groups of people, what is to come when much larger groups begin to form.
What could the future of cyber-security begin to look like with the number of people with access to a computer growing in large volumes, and how far are we from it?
-
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 10 months ago
Intro-to-Ethical-Hacking-Week-5
Please note: This and earlier decks provide the body of knowledge for the mid-term.
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 10 months ago
-
http://www.infosecurity-magazine.com/news/android-flaw-spells-privacy/
o a. One key point you took from each assigned reading. (One or two sentences per reading)
Google seems to be a little lax with their response to a known vulnerability in their phone OS. Pre Android 4.4 OS’s are susceptible to the possibility of having an open email session hijacked.
o b. One question that you would ask your fellow classmates that facilitates discussion?
Our phones are becoming an integral part of the way we live and do business in our daily lives. Is it acceptable for a company to ignore the security of our private information when they know there is a vulnerability in their operating system? -
Key point from readings:
Enumeration 1:
Footprinting is a preventive control that, like scanning, should be performed by the Info Sec staff of the enterprise to identify risks and weaknesses before being targeted by a hacker.
Enumeration 2:
If the reconnaissance or scanning outcome is not solid hackers use enumeration techniques to get specific information about network resources, user profiles and applications.
Question
What kind of information should only provide external name domain servers ?
Article
Google dorks – FBI warning about dangerous ‘new’ search tool
This article is related to the search methods we saw in recent classes when talking about reconnaissance. The warning refers specifically to ‘Google dorks’ or “Google dorking”, the use of specialized search syntax such as “filetype:sql”.
A simple “operator:keyword” syntax, such as “filetype:xls intext:username,” in the standard search box would retrieve Excel spreadsheets containing usernames. Additionally, freely available online tools can run automated scans using multiple dork queries.
This is the link:
-
Footprinting:
Before many hackers perform threatening attacks, they research their victims by either gathering information, usually available to the public and easy to obtain, or simply appearing to be a simple user. Such tools such as “WhoIs” and NsLookup which are fairly easy to use.Battle for the Internet: The War is On:
By putting yourself “in the shoes” of a hacker, and thinking of different ways an attacker could/would expose and harm your system is one of the best first steps to securing a system. By discovering the flaws before “the bad guys” do, you have the advantage of securing them up before attackers have a chance to make their move. According to this article, there are many known flaws with several operating systems, though since this article was written over 10 years ago, there have been many upgrades and patches put into place to fix these vulnerabilities. But that doesn’t mean new vulnerabilities don’t exist. Constantly “staying on top” of the vulnerabilities for your system can only help protect and quite possibly avoid a lot of future grief.Article:
Massachusetts Institute of Technology website hacked by Indian hacker
An Indian hacker going by the name of SaHoo broke into the Massachusetts of Institute of Technology, one of the most prestigious
education institutions of it’s kind in the World. It is thought that hacker simply just wanted to show the weaknesses, though no serious damage was reported.
This is the link:
http://binlu.scripts.mit.edu/calendar/login.php-
Actually this link at the bottom of my page is not working the way it did yesterday.
Please see link below.
http://thehackerspost.com/2014/09/massachusetts-institute-technologymit-hacked-sahoo.html
-
-
In the news:
Apple ships a sevenfold security surprise, including iOS 8 and OS X 10.9.5
http://nakedsecurity.sophos.com/2014/09/18/apple-ships-a-sevenfold-security-surprise-including-ios-8-and-os-x-10-9-5/Is This Free Wi-Fi Safe? Search the Map of Dangerous Networks
http://securitywatch.pcmag.com/networking/327309-is-this-free-wi-fi-safe-search-the-map-of-dangerous-networks?mailingID=70FFE831A418DD37A51C6EC54F27F470 -
The first article “Footprinting: What Is It, Who Should Do It, and Why?” is related and can be a subset of the second article “Battle for the Internet: The War is On!”
Footprinting provides the company information about its resources and can help identify where weaknesses are develop processes to remediate them or minimize the potential risks from an outsider’s successful attack. A company that knows what information about the itself is exposed to the outsiders is in better position to safeguard its resources.One takeaway from the first article is:
“”No longer is it reasonable to rely solely on the installation of antivirus
products to protect the on-line environment. …..””The second article discusses some of the methods and tools the outside attackers use. The security professionals should have the same knowledge, if not more knowledgeable than attackers, to be able to thwart successful attacks. The article relates the ongoing battle between the security professionals and the attackers to the principle and philosophy of Sun Tzu’s “The Art of War”.
-
Free webinar:
CYBERSPACE AS BATTLESPACE
DATE: Thursday, October 9, 2014 2pm-3pm EDTRegistration: https://www.blackhat.com/html/webcast/10092014-cyberspace-as-battlespace.html
In this presentation, Dr. Kenneth Geers draws a new world map, based on the premise that human conflict now often takes place on digital terrain, that many attackers are able to operate from cyber safe havens, and that much of the rest of the Internet is already occupied ground.
The speaker will discuss the ways in which traditional military philosophy and the rules of espionage are being applied by governments to the cyber domain, as well as the nature of malware communications, network traffic analysis, and much more.
-
Regarding fake cell phone towers:
http://www.myfoxdc.com/story/26610194/tech-company-finds-mysterious-fake-cell-towers-in-dc-area
An independent company has found a large number of ‘non-network’ cell phone towers clustered in the Washington, DC area.
This raises the obvious question: Who is putting them there? Are they for the purpose of spying on the government since there are so many government agencies in the area, or are they the government spying on the public or foreign government embassies? -
The flaw allows an attacker to remotely attach a malicious executable to a variable that is executed when Bash is invoked. – See more at: http://threatpost.com/major-bash-vulnerability-affects-linux-unix-mac-os-x/108521
-
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 10 months ago
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 11 months ago
No issues if you already posted in previous weeks presentation, no need to repost. Also, all have been moved to “Author” status.
-
a. One key point you took from each assigned reading. (One or two sentences per reading)
With all of the talk of security in the news, we still have people that do not take the minimal precautions in business to secure private customer data.
b. One question that you would ask your fellow classmates that facilitates discussion?
What does your physician do to secure your personal information at their place of business.
-
Last week it looked like the malware which caused the Home Depot breach was a newer version of BlackPOS. That may need to be re-considered.
This article has a list of major differences which would indicate it is not a version of BlackPOS, but another family of malware.http://www.darkreading.com/home-depot-breach-may-not-be-related-to-blackpos-target/d/d-id/1315636
An interesting point was made in the comments: Why don’t companies do a better job of monitoring what data is being exfiltrated from their systems?
-
Point from the reading:
Not only is it good to be proactive in monitoring attempts to infiltrate the system, but proper reports and records must be kept to so that proper use can be made of the results of the scan. Also, the focus of the scanning tool seems to be only on infiltration, not on exfiltration. This relates to the comment made about the article above.Question:
This article is from 2002. Is this product still available and effective today? If not, what are the current effective products for scanning?
-
-
1. Key points taken from the reading.
Scanning: Many individuals are unaware of how vulnerable their systems are and simply having good “password etiquette” is simply enough to prevent outsiders from hacking into their systems and doing any considerable damage. Also, new viruses and hacks are being developed every day and if one isn’t on top of the latest fixes, one may become a victim pretty quickly. With such tools as Nessus, businesses and organizations can stay on top of most of the vulnerabilities which can harm their systems, though one needs to remember tools such as Nessus will only point out the vulnerabilities and it is the part of the user to check out and fix those which are identified by the Nessus tool. Also, new updated plugins are being introduced on a regular basis to fix the newest threats and if one doesn’t stay on top of this as well, one can’t check for and then fix the more recent threats.2. Question for the class. As technology becomes more complex in the near to late future, do you ever see the possible of a system which is 100% (or close to) hack proof and if so do you think the solution will be one that has been drastically improved upon over the years or one that is innovative and unique?
3. Here is article in regards to Twitter, who not so long ago (the beginning of September) has started paying individuals $140 or more if they find flaws under its new Bug Bounty program. One individual found a way to delete the credit cards of any account as long as one obtained the twitter account id and the credit card id. Once a user had these two fields, a basic Ajax post request substitution is all one needs to cause a little havoc.
http://thehackernews.com/2014/09/twitter-vulnerability-allows-hacker-to_16.html -
Hello everyone,
I forgot to post this information earlier this week. I found a pretty interesting book that Penetration Testing A Hands-On Introduction to Hacking by Georgia Weidman. The site also presents a torrent file to download a Kali Linux VM. I believe it is Kali 1.0.6. The company is “No Starch Press.” If you get the book don’t stay up too late. Enjoy!
Cheers,
Britt
-
Week 4 – Reading and article:
Key point
Periodic vulnerability scanning helps discover weaknesses that would likely be exploited by hackers. However, a single tool, like Nessus, can not replace the information security professional knowledge and experience about security strategy and configuration.
Question for the class
What types of vulnerabilities can be discovered with Nessus ?
Article
How to Choose the Best Vulnerability Scanning Tool for Your Business
Some of the best-known and more highly rated commercial vulnerability scanners are Nessus (Tenable Network Security), Secunia CSI and Core Impact (Core Security). Nessus started as a free tool but was eventually converted to a commercial product, with a beefed-up feature set and higher quality tech support. Secunia is free for personal use and affordable for commercial use. Core Impact is pricey ($40,000 and up) but offers terrific value for the money.
A newer type of vulnerability scanner is delivered on-demand as Software as a Service (SaaS). Products such as Qualys Vulnerability Management provide continuous, hands-free monitoring of all computers and devices on all network segments (perimeter to internal). They can also scan cloud services such as Amazon EC2.
-
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 11 months ago
-
IN THE NEWS:
Google says Gmail credential dump not result of company breach
http://www.scmagazine.com/google-says-gmail-credential-dump-not-result-of-company-breach/article/371092/The credentials dump was not a result of a breach but was obtained through a combination of sources. If the same credentials are used across different websites then it makes it easier to hack other systems if one of the websites is compromised.
Are the FBI and “weev” both hackers?
FBI’s conduct to find Silk Road servers was similar to “weev’s” criminal hacking.
http://arstechnica.com/tech-policy/2014/09/are-the-fbi-and-the-weev-both-hackers/
The actions the FBI took to find the servers of the online drug haven Silk Road could fall under the same hacking statute in which his high-profile client was charged.Andrew Auernheimer, aka ‘weev,’ who readers may recall was criminally prosecuted for his role in visiting website addresses on an AT&T server that AT&T had thought and hoped would not be found by the public. Auernheimer’s co-conspirator found that AT&T had posted e-mail addresses on its server at IP addresses that the public was not expected to find. In defending its prosecution, DOJ took the view that obtaining information at the website addresses was criminal unauthorized access because AT&T had not intended for the public to see it and it was in a place where an ordinary computer user would likely not find it.
In defending conduct in the Silk Road case, however, DOJ takes the view that there is ‘nothing . . . unlawful’ about taking advantage of a server misconfiguration to obtain data inadvertently ‘leaked’ by the server because that information is ‘fully accessible to the public.’
Shedding Light on the Foreign Intelligence Surveillance Court (FISC): Court Findings from Our 2007-2008 Case
http://yahoopolicy.tumblr.com/post/97238899258/shedding-light-on-the-foreign-intelligence-surveillance
-
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 11 months ago
-
Hi guys,
If your using the latest and greatest flavor of the month (Windows 8/8.1), Powershell comes installed by default per Microsoft. Opps! Check out this site that discusses using Kali with Powershell to by pass AV and fingerprint the machine.
https://www.trustedsec.com/uncategorized/powershell-reconnaissance/
o a. One key point you took from each assigned reading. (One or two sentences per reading)
Both articles make it abundantly clear that “Research skills” and the use of various freeware tools will be of great assistance in quietly fingerprinting a customer/client.
o b. One question that you would ask your fellow classmates that facilitates discussion.?
Do you have any great recon sites that you use that you would be willing to share? -
Hello,
1. One key point you took from each assigned reading.
a) The Art of Reconnaissance
The author of this article shows the basics on how to find weaknesses when gathing
information about a particular possibly before an attack like ping sweeps, fingerpring and port scanning. This in turn
can detect if the remote machine is “up”, detecting the operation system and detecting which ports are open and shut down.b) Using Open Source Reconnaissance Tools for Business Partner Vulnerability Assessment
The author of this article shows issues which are important to follow regarding Ethica Hacking procedures.
Leaving passwords for user “Root” as Password (perhaps the Default) or performing intense scanning may cause website to
crach or fill up the available bandwith2. What each of the articles have in common
c) What the two article both share the flaws a system may have and how by using the right tools, an outsider can
cause problems, to say the least, about the system whether it be an internal or external.
The both show what precautions one may want to take to lesson some of these problmens.3. One question that you would ask your fellow classmates that facilitates discussion.?
What kind of safeguards do you think large coporations like Walmart, Target and major Banks like Wells Fargo may
take, on top of what was mentioned in the articles, which may decrease external hacker penetration
What kind of internal actions may the same organations take to make sure that each of it’s employee are
doing their part not to give hackers, either from the inside or outside, a way of obtaining access to a system
where they may do reputable damage.4. Here is article which discusses the pros and cons of cloud coputing and since cloud computing are in the
early stages of seurity protection, consumers may want to take the proper precaution, some mentioned in this article
to help protect their information. See link below;
http://www.technewsworld.com/story/80991.htmlDave Siegelman
-
Reading one keypoint:
Your IP is one of the starting blocks for outsiders to gain information about you or your organization. They can gather information about your ISP and your approximate whereabouts.
The key in reconn is to observe and study the targeted system and look for patterns and weaknesses, may it be from the systems or personnel. Reconn = patienceReading two keypoint:
The open source reconn tools can be used by both sides, i.e, the corporate and the outsiders. The outsiders are very creative and imaginative in seeing possible routes to the discovered systems. On the business side, they have to be diligent in keeping their systems up-to-date and properly configured all the way to the desktops, and most importantly make the employees aware of information security through trainings. -
Key points from assigned reading:
Art of Reconnaissance: Two things that I like from the reading, apart from the technical how-to’ is to consider basic steps before attempting any recon testing:
(a) To get a written consent before you do any recon testing on a network and (b) to never do recon testing using your own network connection. The question here is: how does one ensure that their own system’s integrity remains intact?
Using open Source tools for Business Vulnerability Assessment:
The reading lists some open source tools one can use to check for business vulnerability. It is important for the sake of network integrity and intrusion prevents that it vulnerability management be taken seriously as part of a “good information security program”. Question is what steps do you take to enforce decisions with your vendors about information sharing and access to your systems? At the end of the day, it’s not just one system that is vulnerable by getting shared information.Article:
Better Cyber Security methods: invest in people and processes, says Art Gilliland http://alturl.com/jat9zHP’s enterprise and security chief, Art Gilliand, in an interview points that the industry needs to invest on people who understand the nature of the threat and invest in processes that will help keep the network available and secure. The biggest concern is to fill the ‘skill gap’ that currently exists.
-
Interesting reading from SANS: The Keep Within the Castle Walls – An Experiment
in Home Network Intrusion Detection: http://alturl.com/3hy3y -
An interesting article from KrebsOnSecurity about the latest breach at Home Depot.
http://krebsonsecurity.com/2014/09/home-depot-hit-by-same-malware-as-target/There seems to be evidence that it used the same method as last year’s attack on Target, only a newer version of BlackPOS.
This version ‘disguises the malware as a component of the antivirus product running on the system.’
-
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 11 months ago
Here are the links for downloading Kali and VMware Player:
http://www.kali.org/downloads/
https://my.vmware.com/web/vmware/downloads
Still working on confirming VMware Workstation
-
Wade Mackey wrote a new post on the site Intro to Ethical Hacking 10 years, 11 months ago
Here is our first weeks presentation material: Intro to Ethical Hacking