• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Week 03: Reconnaisance

Four Disruptive ‘Cyber Trends’ At RSA

November 14, 2017 by Brent Hladik 1 Comment

https://www.forbes.com/sites/jasonbloomberg/2017/02/20/four-disruptive-cyber-trends-at-rsa/#5272e2d69917

This article is interesting in all of the different kinds of cyber tools out there that companies could use to

analyze any kind of potential cyber security attack on their systems.

Apple explains Face ID on-stage failure

November 7, 2017 by Younes Khantouri Leave a Comment

Apple has lunched recently the new IphoneX with a new future called FaceID to replace the Finger print ID future. Few issues concerning the new facial recognition system have been raised, It became such a debate whether it might make it easier for the authorities or thieves to force a user to unlock their handset and whether it will handle the hijab worn by some Muslim women, among other facewear.

This new Iphone X will be available in November. Journalists at the launch at the company’s Cupertino, California headquarters were shown Face ID working in controlled circumstances.

On Wednesday, Senator Al Franken published a letter he had sent to Apple seeking more information about this new future.

The biggest question at this time how Face ID will impact iPhone users’ privacy and security, and whether the technology will perform equally well on different groups of people,” he wrote.”To offer clarity to the millions of Americans who use your products, I ask that you provide more information on how the company has processed these issues internally, as well as any additional steps that it intends to take to protect its users.”

http://www.bbc.com/news/technology-41266216

Fitbit Vulnerabilities Expose Wearer Data

October 31, 2017 by Younes Khantouri Leave a Comment

I really like the following article this week and I think it’s nice to share it with the entire class:

Fitbit became another device that can be used to track our personal lives and give Hackers the ability to even change our record that Fitbit collects. These Hackers discovered a way of intercepting messages transmitted between fitness trackers and the cloud servers where data is sent for analysis.

These changes that can be made in the record would not only affect us as users but big companies as well. So many companies are dependent on such devices to collect information do develop and rate certain product won’t receiving accurate data and all their new products would be built using false information.

If this kind of analysis that shows that the Fitbit servers are not receiving the correct data. It could be used to determine whether a person has a specific medical condition; and, the impact of this to the individual could be raised healthcare premiums or even denied coverage due to pre-existing conditions. Further, once the data is in the hands of an organization, it could potentially be sold for other purposes.

To solve this issue and secure the Fitbit, the researchers have created guidelines to help manufacturers remove similar weaknesses from future system designs to ensure users’ personal data is kept private and secure. It is very hard to secure such devices but it can be done by keep researching and studying all the weaknesses to create the right patches that will not give chance to Hackers to reach out there goals.

https://www.infosecurity-magazine.com/news/fitbit-vulnerabilities-expose/

 

U.S. Asks China Not to Enforce Cyber Security Law

September 26, 2017 by Jonathan Duani 4 Comments

I thought this was a pretty interesting article because it pertains to stuff that we were discussing in class. The article discusses how the US would like china to not enforce their new policy that requires companies who do business with china to house all data in the country and also have security that is subject to checks.

I think that this is important because you need to know the local laws of the companies that you are working with. It is also important because if china does not listen to the US and enforces the polices a lot of companies will have to  rework a lot of their infrastructure and security in order to comply.

 

https://www.usnews.com/news/top-news/articles/2017-09-26/us-tells-wto-concerned-about-chinese-cyber-security-laws

Credit Agency Equifax Cracked, 143 Million Consumers Exposed

September 24, 2017 by Donald Hoxhaj 1 Comment

http://www.technewsworld.com/story/84795.html

Credit Agency Equifax Cracked, 143 Million Consumers Exposed

This article talks about the following: Equifax suffered a major criminal data breach that exposed personal information of as many as 143 million consumers in U.S, sensitive personal data, including names, addresses, social security number, birth dates, and driver license number were exposed, Equifax took action as soon as they found out about the attack, Equifax responded well to the attack, they accepted full responsibility and immediately started to work on the issue, and finally consumers should check the Equifax site to insure that their data has not been exposed.

It will be interesting to see how things unfold in the upcoming months. Are there other companies that might be affected due to doing business with Equifax? Did Equifax have the right controls in place to prevent the attack or were they negligent? Also, will they be held accountable and what will the cost be?

Global Cyberattack on Energy Sector Stokes Deep Fears

September 19, 2017 by Elizabeth V Calise Leave a Comment

I found this article quite interesting since I recently entered the environmental sector for work.

A hacker group known as “Dragonfly” is behind recent cyber attacks on the energy industry in Europe and North America. There was strong activity shown in the United States, Turkey and Switzerland. These attacks can disrupt energy operations in both continents. The impact of the attacks has been minimal, but many are concerned about the future. The motive behind these attacks has not been determined. There have been no signs of motivation in regards to monetary, extortion or economic espionage. Due to the targets of the attacks, the level and types of attacks and collection of data and information, it has been concluded that a nation-state may be behind this.  Additionally, the attackers are using unsophisticated methods to hack into the SCADA systems. They are not exploiting zero-day vulnerabilities, but are taking the social engineering route. The Dragonfly hackers are collecting credentials and performing reconnaissance on the systems they are targeting.

http://www.technewsworld.com/story/84790.html

How the NSA identified Satoshi Nakamoto

September 19, 2017 by Jonathan Duani Leave a Comment

This is a pretty interesting article that I found that even though it is a couple weeks old now I think that it still hold true and gives important information. The article talks about how the NSA sues langue to track identities of anonymous people, like Satoshi Nakamoto, the person who invented bitcoin. They use a lot of techniques that are actually not that new to trace back his origin and pin point who he really is. What is interesting is back in the late 90s this is part of the way that the FBI caught the Unabomber Ted Kaczynski. They analysed his manifesto and published it and with the uniqueness of his language was able to find him. I thought this was interesting with us hacking different systems we all leave a trace or a something that is unique about us that sometimes we don’t even realize.

Source: https://medium.com/cryptomuse/how-the-nsa-caught-satoshi-nakamoto-868affcef595

More information on Election Hacking Released

September 18, 2017 by Fraser G Leave a Comment

Source: http://time.com/4828306/russian-hacking-election-widespread-private-data/

Election Hackers Altered Voter Rolls, Stole Private Data, Officials Say

This article is a synopsis of hacking efforts in the 2016 election, as more reports have surfaced about the type of hack and amount of data compromised. One of the biggest takeaways is that systems in all 50 states were probed, as one official noted “We had to assume that they actually tried to at least rattle the doorknobs on all 50, and we just happened to find them in a few of them.” That being said, the number of successful intrusions was “less than a dozen.” The article mentions that the hackers used automated programs that scan for vulnerabilities — I wonder what programs they used?

The information hackers did manage to obtain include  social security numbers and drivers license information. The two biggest concerns at the moment are 1) whether or not one of the candidates had access to this info and if they were able to gain an advantage with this data and 2) Public perception of polling systems and integrity of the vote. Losing public trust in a fair democratic process would/will have huge ramifications and no doubt spur legislation to try to secure these systems.

CCleaner Compromised Before Release

September 18, 2017 by Richard Mu 5 Comments

CCleaner, a popular maintenance and file clean-up software, was found to have been compromised with a backdoor application. Piriform, the developers of CCleaner, announced on September 18 that CCleaner version 5.33.6162 and CCleaner Cloud v1.07.3191 for 32-bit Window users were the infected versions. Through an investigative process, it was noticed that the software was illegally modified before it was released to the public and made available. The modification was made in the binary of the .exe file that allowed for a two-stage backdoor from a remote IP address on the affected systems. Besides the backdoor applications, it was also collecting information on the name of the computer, list of installed softwares and windows updates, running processes, MAC addresses, and information if the processes were running with administrator privileges. Currently, CCleaner Cloud has been automatically updated and that CCleaner should be manually updated as soon as possible.

https://www.forbes.com/sites/thomasbrewster/2017/09/18/ccleaner-cybersecurity-app-infected-with-backdoor/#51b0f0a1316a

http://thehackernews.com/2017/09/ccleaner-hacked-malware.html

http://www.piriform.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users

How a Fishtank Helped Hack a Casino

September 17, 2017 by Ian Riley 1 Comment

Web Summary

Original PDF Source (See Page 8)

tl;dr: >10 GB of data was exfiltrated from a North American casino using a recently installed Internet of Things fishtank.

There’s not a TON of info on this (since no casino wants to divulge too much about how it was hacked or what data was lost), but there’s two details that really stand out to me:

  1. Because the device was rather new on the network, the traffic on it was never properly profiled before the hack took place.
  2. The communications took place using a audio/video protocol. Similar to ping tunneling, where the data is hidden inside a ping, I think the data here was exfiltrated using an AV protocol so that it would be less likely to be noticed by the casino. If, say, video logs were being sent off-network, it wouldn’t be unusual to see this type of traffic leaving the casino’s network.
  3. (Confusion): The article says the fishtank was “configured to use an individual VPN”; I don’t know what they mean here. I think they’re trying to say that it had its own VLAN, so it wouldn’t be able to interact with devices on the main VLAN? By my understanding, VPNs are just used to create an excrypted internet connection through a third party.
  • Page 1
  • Page 2
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in