• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Week 06: Sniffers

Commenting plugin Disqus hacked

October 9, 2017 by Matt Roberts Leave a Comment

A few days ago, it was revealed that a popular commenting system used by many websites called Disqus was breached in 2012, compromising the information of over 17.5 million users. Apparently, it went unnoticed for 5 years until this past Thursday when the incident was discovered by an independent security researcher. It is likely that the information obtained (including SHA-1 hashed passwords) could be used in social engineering attacks on certain users. Disqus has made several security upgrades in the years since, including switching to a more secure password hashing algorithm, but this story is still developing as their investigation into the incident continues.

https://thehackernews.com/2017/10/disqus-comment-system-hacked.html

VPN provider assists FBI in arrest

October 9, 2017 by Matt Roberts 1 Comment

Recently, a Hong Kong-based VPN provider named PureVPN assisted the FBI in the arrest of a cyberstalker by releasing logs of his activity while using their service. The arrest is obviously good news, but the interesting thing is that while PureVPN explicitly states that they “do not monitor activity or keep logs,” this is clearly not the case. Most VPN providers make similar claims, but this is hard to verify from the outside. This should make VPN users take a closer look at the service they use, and be mindful that they may not be as secure as they claim.

https://thehackernews.com/2017/10/no-logs-vpn-service-security_8.html

Companies are unaware of poor data management

October 9, 2017 by Fred Zajac 2 Comments

Sara Guo was interviewed at the Cyber Security Summit in Boston this morning.  She works for a venture capitalist firm investing in technology companies.  She mentioned the companies involvement with two security companies and shocking results from audits of several clients’ information systems.

She said, “There wasn’t a single [company] where we didn’t find bad behavior already… while examining the databases of some of its clients, was able to find a shocking amount of bad behavior that the companies were completely unaware of — including corporate espionage and insider threats.”

Yikes…

https://www.cnbc.com/2017/10/09/greylocks-sarah-guo-us-doest-take-data-security-seriously-enough.html

News Article -Week 6

October 8, 2017 by Christie L Vazquez Leave a Comment

https://thehackernews.com/2017/10/formbook-password-stealer.html

Malware as a service is becoming more popular, a keystroke capturing and password stealing program is available for purchase.

‘Invisible’ Technologies: What You Can’t See Can Hurt You

October 8, 2017 by Elizabeth V Calise Leave a Comment

There is more to technology than end-user experience. Aside from user experience, there are other considerations like maintenance, operations and 24/7 support. Even though some of these considerations are less visible, they are just as important. When one has a technology that is ubiquitous, it starts to fade and not be well noticed. People tend to notice when there are issues. Something to compare this to is when you only notice your plumbing system when there is a leak. Other than that you do not think twice about. There are technologies that are very important to the business environment and keep the organization running smoothly, yet the awareness for the technology falls under the radar. Since these technologies operate below the radar, it is a high possibility they are not being examined from a risk perspective. Some examples of this are TLS, SSH, SAML and Kerberos.

Using TLS to take the example further, there are several issues that may not come to mind instantly. Legacy protocol version are known to be susceptible to attack and usage related issues like HTTPS Interception.

 

https://www.technewsworld.com/story/84852.html

The Science Behind “Blade Runner”’s Voight-Kampff Test

October 8, 2017 by Andres Galarza 1 Comment

http://nautil.us/blog/the-science-behind-blade-runners-voight_kampff-test

Lighter read in the spirit of Blade Runner 2049 being released.

Week 6 Presentation and Link to DOS Reference

October 4, 2017 by Wade Mackey 2 Comments

Intro-to-Ethical-Hacking-Week-6

https://www.tutorialspoint.com/batch_script/

  • « Go to Previous Page
  • Page 1
  • Page 2

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in