• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Week 10: Web Application Hacking

How To Stop Hackers

December 19, 2017 by Sachin Shah Leave a Comment

https://www.popsci.com/technology/article/2013-09/how-stop-hackers-teach-students-hack

This article starts with the concept that Schools should teach students learn how to stop malicious hackers by learning their ways. Imagine a world where security guards learn to be robbers first. The first step for students, before moving into a government or corporate job where they work to prevent hacks, is to learn the darker side of the trade: exploiting loopholes, thieving from servers, cracking passwords–and not just learning and performing them, in a classroom set up especially for the experience. Students learn the tricks they need to break past a system’s defenses, but not when to use which tricks. Imagine getting the keys, not the locks is the analogy the author used. I think this article even though is a few years old relates to our program and what we are learning. The classes listed in this article have the same names as in our program.

WHATSAPP HACK SHOWS THAT EVEN ENCRYPTION APPS ARE VULNERABLE IN A BROWSER

November 14, 2017 by Brent Hladik 1 Comment

https://www.wired.com/2017/03/whatsapp-hack-shows-even-encryption-apps-vulnerable-browser/

This site goes over in detail what happened to the Whatsapp application recently where their

encryption apps were even broken into.  It just goes to show that anything is potentially vulnerable if

if it is on the web in a public space and not private.

Backdoor Found In OnePlus

November 14, 2017 by Richard Mu Leave a Comment

It was discovered that all OnePlus devices that are running OxygenOS have a backdoor that allows anyone to gain root access. The application left available to be accessed is known as EngineerMode. A diagnostic testing application by Quacomm, EngineerMode was made to test hardware components of devices. It was designed to diagnose with GPS, root status, and various tests.

https://thehackernews.com/2017/11/oneplus-root-exploit.html

ADT acquires Datashield, aims to blend physical and cyber security

November 14, 2017 by Jonathan Duani Leave a Comment

ADT is a well known security company for your home or business. If someone breaks to your house or business the system will call the police and alert someone that someone has tired to break in or has broken into the building. Now ADT is going into the cyber security realm they added another part of their business which will monitor the systems that are on your network to make sure that ou are not being hacked. The CEO says, “his company wants to protect physical locations as well as the networks attached to them.”

 

http://www.zdnet.com/article/adt-acquires-datashield-aims-to-blend-physical-and-cyber-security/

British Hacker Admits Using Mirai Botnet to DDoS Deutsche Telekom

November 7, 2017 by Younes Khantouri Leave a Comment

In Germani, a 29-year-old man who named by authorities as “Daniel K.,” was arrested ong the 22nd of February pleaded guilty in the court on Friday to charges related to the hijacking of more than one Million Deutsche Telekom routers.

According to reports in the German press, the cyber attacks powered by the notorious Mirai malware has been pleaded guilty to “attempted computer sabotage.” He was behind the cyber attack that knocked more than 1.25 Million customers of German telecommunications provider Deutsche Telekom offline last November.

According to the German authorities, the attack was especially severe and was carried out to compromise the home routers to enrol them in a network of hijacked devices popularly called Botnet, which is being offered for sale on dark web markets for launching DDoS attacks.

Late last year, Deutsche Telekom’s routers became infected with a modified version of the Mirai malware – infamous IoT malware which scans for insecure routers, cameras, DVRs, and other IoT devices and enslaves them into a botnet network – causing over a million pounds’ worth of damage, the company said at the time.
At the time of his arrest, the suspect faced up to 10 years in prison. He’s due to be sentenced on July 28. The BKA got involved in the investigation as the attack on Deutsche Telekom was deemed to be a threat to the nation’s communication infrastructure.

https://thehackernews.com/2017/07/mirai-botnet-ddos.html

IEEE P1735 Encryption Broken

November 7, 2017 by Richard Mu 1 Comment

Security researchers have found weakness “in the Institute of Electrical and Electronics Engineers (IEEE) P1735 cryptography standard that can be exploited to unlock, modify or steal encrypted system-on-chip blueprints.” IEEE P1735 was designed to encrypt electronic-design intellectual property (IP) in the hardware and software. Most mobile and embedded devices include a System-on-Chip (SoC), a circuit that consists of multiple IPS that range from radio-frequency receiver to cryptographic engine from different vendors.

Published by the Department of Homeland Security’s US-CERT, IEEE P1735 is flawed. It was discovered that there was seven vulnerabilities that were found.

Vendors have already been alerted and contacted.

https://thehackernews.com/2017/11/ieee-p1735-ip-encryption.html

Accenture latest firm caught with lax cybersecurity

November 7, 2017 by Amanda M Rossetti 2 Comments

https://www.consultancy.uk/news/14433/accenture-latest-firm-caught-with-lax-cybersecurity

 

On the heels Deloitte’s security vulnerability coming to light another company large in the cyber security space reportedly suffers from lax cyber security themselves. The article explains that Accenture had a large cache of sensitive information on their cloud stage without it being password protection. It is believed that the information is now secure without incident but I think it is probably too soon to be sure that it wasn’t accessed by someone with malicious intent. Like with Deloitte, it draws into question Accenture’s credibility in that they recommend to their clients best cyber security practices but fail to follow them themselves.

China has launched another crackdown on the internet — but it’s different this time

November 7, 2017 by Elizabeth V Calise 4 Comments

I found this article interesting since it relates to a prior discussion the class had about an organization’s data when having an international site in China. Even though China is the world’s second largest economy, a lot of things are becoming less free regarding digital communication. The country’s regulators are becoming more aggressive on what more than 750 million users can and cannot do online. This year, the country has become quite strict on the most popular video-streaming websites, cracked down on their VPNs, removed foreign TV shows from online platforms, required users to register to online forums with their real names and introduced laws that hold chat group admins accountable for what is being said in their spaces. Additionally, the new laws require online news websites to be overseen by the government. China internet users have expressed frustration towards these changes. A student from the mainland relied on VPNs to connect to the outside world. Another stated they utilized VPNs to allow them access to YouTube and other reference websites that helped them with their class work. I could not imagine the government pretty much controlling my every move on the internet. Like the one student from China explained, she used a lot of outside sites to help with course work as a lot of people do around the world. China seems to be taking the control to the next extreme, which based off feedback is hurting more than helping. I could never imagine not having access to Google at any point which is a source a majority of the people rely on to find websites and get questions answered.

https://www.cnbc.com/2017/10/26/china-internet-censorship-new-crackdowns-and-rules-are-here-to-stay.html

 

Warning: Critical Tor Browser Vulnerability Leaks Users’ Real IP Address—Update Now

November 6, 2017 by Shi Yu Dong 1 Comment

This article describes that researchers have found a critical vulnerability that users could leak their real IP addresses to potential attackers when they use TOR anonymity browser. Tor (The Onion Router) is free software for enabling anonymous communication and was initially a worldwide network of servers developed with the U.S Navy that enabled people to browse the internet anonymously. Now it’s a non-profit organization whose main purpose it the research and development of online privacy tools. According to the article, the security researcher Filippo Cavallarin mentions that the vulnerability resides in FireFox that eventually affects Tor Browser since the privacy-aware service that allows users to surf the web anonymously uses FireFox at its core. The security researcher also describes that the vulnerability currently only effect for MacOS and Linux users only. However, the research warning Tor users to be aware of this vulnerability.

https://thehackernews.com/2017/11/tor-browser-real-ip.html

Weekly News Article

November 5, 2017 by Christie L Vazquez Leave a Comment

https://www.darkreading.com/analytics/security-monitoring/unstructured-data-the-threat-you-cannot-see–/a/d-id/1330070

A good area where AI, and machine learning will help the cyber industry. Information is critical to an IT organization especially during an incident. With unstructured data, data that is not in their SIEMs, it is a challenge for them to get ahead of threats.

  • Page 1
  • Page 2
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in