• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Week 01: Overview

Facebook Offers Rewards for Access Token Exposure Flaws

September 18, 2018 by Satwika Balakrishnan Leave a Comment

Facebook has announced expansion of its bug bounty program to include third-party apps and websites that let people use their Facebook accounts to log in.  The company has declared that it will pay at least $500 to anyone who reports vulnerabilities that involve “improper exposure of Facebook user access tokens.” Access tokens allow users to log into third – party applications and websites through Facebook. One condition that the company has put forth is that the bug should be discovered by passively viewing data sent to or from a device while the affected application is in use.

https://www.securityweek.com/facebook-offers-rewards-access-token-exposure-flaws

Someone Hijacked MEGA Chrome Extension to Steal Users’ Passwords

September 12, 2018 by Nishit Darade Leave a Comment

The official Chrome extension for the MEGA.nz cloud storage service had been compromised and replaced with a malicious version that can steal users’ credentials for popular websites like Amazon, Microsoft, Github, and Google, as well as private keys for users’ cryptocurrency wallets.

On 4 September at 14:30 UTC, an unknown attacker managed to hack into MEGA’s Google Chrome web store account and upload a malicious version 3.39.4 of an extension to the web store, according to a blog post published by the company.

Four hours after the security breach, the company learned of the incident and updated the extension with a clean MEGA version (3.39.5), auto-updating all the affected installations. Google also removed the MEGA extension from its Chrome Web Store five hours after the breach.

https://thehackernews.com/2018/09/mac-adware-removal-tool.html

No.1 Adware Removal Tool On Apple App Store Caught Spying On Mac Users

September 10, 2018 by Ruby(Qianru) Yang Leave a Comment

A top-tier application in Apple’s Mac App Store that’s designed to protect its users from adware and malware threats has been found surreptitiously stealing their browsing history without their consent, and sending it to a server in China. The researcher then investigated Adware Doctor with ex-NSA staffer Patrick Wardle, who deep dive into the app and today published a blog post, saying that the app sidesteps Apple’s sandbox and covertly collects users’ browser histories and then transfers it to a server in China—which is blatant violations of Apple’s developer guidelines.

New PHP Code Execution Attack Puts WordPress Sites at Risk

September 8, 2018 by Raaghav Sharma Leave a Comment

A new exploitation technique has been discovered that could make it easier for hackers to trigger critical deserialization vulnerabilities in PHP programming language using previously low-risk considered unserialize() PHP function.

https://thehackernews.com/2018/08/php-deserialization-wordpress.html

Week 1 Class Recording

August 30, 2018 by Wade Mackey Leave a Comment

https://capture.fox.temple.edu/Mediasite/Play/2cadc43e919844839a9b8f82fd77bc3e1d

 

Week One Presentation

August 28, 2018 by Wade Mackey Leave a Comment

Intro to Ethical Hacking-week-1

Welcome to Ethical Hacking

August 19, 2016 by Wade Mackey

Welcome to Ethical Hacking

Primary Sidebar

Weekly Discussions

  • Uncategorized (14)
  • Week 01: Overview (7)
  • Week 02: TCP/IP and Network Architecture (18)
  • Week 03: Reconnaisance (17)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (17)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (15)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (15)
  • Week 12: Web Services (25)
  • Week 13: Evasion Techniques (8)
  • Week 14: Review of all topics (15)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in