• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Week 07: NetCat and HellCat

Week 7 – News Article

October 16, 2017 by Christie L Vazquez Leave a Comment

Interesting malware, DoubleLocker, can reset your PIN and encrypts your data. Interesting that is does both.

https://www.darkreading.com/mobile/doublelocker-delivers-unique-two-punch-hit-to-android–/d/d-id/1330134?

Yet Another Linux Kernel Privilege-Escalation Bug Discovered

October 16, 2017 by Shi Yu Dong Leave a Comment

Recently, security researchers have discovered a new privilege-escalation vulnerability in Linux kernel that could allow a local attacker to execute code on the affected systems with elevated privileges. In the article, it describes that an attacker with local access to the targeted system, they can execute a maliciously crafted application on a targeted system which allows the attackers to elevate his privilege to root on the targeted system. Besides that, the article also mentions that the vulnerability affects major distributions of the Linux operating system including RedHat, Debian, Ubuntu, and Suse.

 

https://thehackernews.com/2017/10/linux-privilege-escalation.html

WPA2 Cracked

October 16, 2017 by Fraser G 4 Comments

https://www.krackattacks.com/

 

WPA2 encryption has been compromised. KRACK Attacks or Key Reinsallation Attack allows hackers to decrypt packets in Wifi traffic and … “use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks.”

 

Things to note:

  • The entire WPA protocol is vulnerable, meaning that this isnt specific to a certain product or implementation
  • According to Wigle.net – a Wifi wardriving analysis site, there are >390M Wifi Networks in the US (that have been found) with nearly 60% of them using WPA2 – as of Jan 2017.
  • This vulnerability CAN be fixed but you must patch

 

I wonder if this will speed up the adoption of a new protocol.

 

 

 

Movies for Hackers

October 14, 2017 by Andres Galarza Leave a Comment

https://github.com/k4m4/movies-for-hackers

Another light post that I found courtesy of Reddit.

Unpatched Exploit Lets You Clone Key Fobs and Open Subaru Cars

October 13, 2017 by Jonathan Duani 1 Comment

I thought this was super cool and since I own one of the affected years part of me really wants to build out what they are talking about and try it. ( i already have all the comments that are needed). This article talks about how there is an exploit in specific model year Subarus that can cause you to capture the FOB packets and then with a simple script  you are able to unlock and relock the car. Subaru claims they are aware of this issue but have no done anything about it. I also wanted to note that even though I do own one of the effected cars at this point nothing on that car is stock including the alarm so the chances of this actually working for myself are slim because the OEM system is bypassed but it is still cool to give it a try.

 

https://www.bleepingcomputer.com/news/security/unpatched-exploit-lets-you-clone-key-fobs-and-open-subaru-cars/

Don’t overlook physical controls

October 11, 2017 by Fred Zajac 3 Comments

USA Today reports the NSA’s Tailored Access Operation unit had a serious data breach.  This is one of the largest incidents at NSA over the last five years.

The story reports, the access controls at the TAO’s locations are “porous”, allowing workers to easily remove information by digitally removing or by simply walking out the front door.

Here are a few quotes from the story:

“Physical security wasn’t much better, at least at one TAO operator’s facility. He told The Daily Beast that there were “no bag checks or anything” as employees and contractors left work for the day—meaning, it was easy smuggle things home. Metal detectors were present, including before Snowden, but “nobody cared what came out,” the second source added. The third source, who visited TAO facilities, said bag checks were random and weak.”

“If you have a thumb drive in your pocket, it’s going to get out,” they said.
Unsurprisingly, workers need to swipe keycards to access certain rooms. But, “in most cases, it’s pretty easy to get into those rooms without swipe access if you just knock and say who you’re trying to see,” the third source added.

“The TAO is the tip of the NSA’s offensive hacking spear, and could have access to much more sensitive information”.

“Defense Department’s inspector general completed in 2016 found that the NSA’s “Secure the Net” project—which aimed to restrict access to its most sensitive data after the Snowden breach—fell short of its stated aims. The NSA did introduce some improvements, but it didn’t effectively reduce the number of user accounts with ‘privileged’ access, which provide more avenues into sensitive data than normal users, nor fully implement technology to oversee these accounts’ activities”

I guess the Top Secret classification doesn’t mean what it used too…

http://www.msn.com/en-us/news/technology/elite-hackers-stealing-nsa-secrets-is-%E2%80%98child%E2%80%99s-play%E2%80%99/ar-AAtiWhO?li=AA4Zoy&ocid=spartandhp

Week 7 Presentation

October 10, 2017 by Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-7

Includes update on snaplength.  Thanks Ian!

  • « Go to Previous Page
  • Page 1
  • Page 2

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in