• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Week 03: Reconnaisance

New Ransomware Named PyLocky Discovered

September 15, 2018 by Brock Donnelly 1 Comment

https://latesthackingnews.com/2018/09/14/new-ransomware-named-pylocky-discovered/

As the title says, Trend Micro has a newly discovered ransomware. This malware poses as another ransomware known as Locky yet seems to be just riding on Locky’s infamy coattails. This malware uses Python Scripts converted into standalone executables, lays dormant for 11.5 days or 999,999 seconds before it begins to encrypts files in 3DES… all while communicating to the control server. Yikes…

Attacks have been mostly European focused.

Wi-Jacking – New Wifi Attack Allow Accessing Millions of Neighbour’s WiFi Without Cracking

September 14, 2018 by Raaghav Sharma 2 Comments

ewly identified WiFi attack called Wi-Jacking allow hackers to attack millions of WiFi network and accessing the neighbor’s WiFi without any form of Cracking.

few pre-requisites for this:

  • There MUST be an active client device on the target network
  • Client device MUST have previously connected to any other open network and allowed automatic reconnection
  • Client device SHOULD* be using a Chromium-based browser such as Chrome or Opera
  • Client device SHOULD** have the router admin interface credentials remembered by the browser
  • Target network’s router admin interface MUST be configured over unencrypted HTTP

Mitigations

  • Only login to your router using a separate browser or incognito session
  • Clear your browser’s saved passwords and don’t save credentials for unsecure HTTP pages
  • Delete saved open networks and don’t allow automatic reconnection
  • As it is nearby impossible to tell if this attack has already happened against your network, change your pre-shared keys and router admin credentials ASAP. Again, use a separate/private browser for the configuration and choose a strong key.

https://gbhackers.com/wi-jacking-wifi-attack/

Week 3 Class Recording

September 13, 2018 by Wade Mackey Leave a Comment

https://capture.fox.temple.edu/Mediasite/Play/ddd3cd0dc4d54b118fab6e7ba8a317a21d

Week 3 Presentation

September 13, 2018 by Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-3

Project Verify – US Cellphone provider come together to provide online authentication

September 13, 2018 by Sev Shirozian Leave a Comment

It looks like Brian Kreb’s is reporting on a new initiative between the 4 major wireless carrier, AT&T, Verizon, Sprint and T-Mobile to give customers a new way to authenticate on the Internet.  I have mixed feelings about this cause the carriers don’t typically do a good job with authenticating their own customers.  Not sure how well this is going to work or going to be received by the general population.

https://krebsonsecurity.com/2018/09/u-s-mobile-giants-want-to-be-your-online-identity/

New Cold Boot Attack!

September 13, 2018 by Sev Shirozian Leave a Comment

Funny we were just talking about this yesterday in class.  A new article on a new cold boot attack popped up on my feed this morning.  It’s a variation of the old cold boot attack the Professor mentioned in class yesterday.  Researchers from the Finnish cyber-security firm F-Secure are figuring out a safeguard that was protecting computers from this attack.

https://thehackernews.com/2018/09/cold-boot-attack-encryption.html

 

 

Riddles!!! – Food For Thought — Answers

September 12, 2018 by Jayapreethi Selvaraju Leave a Comment

I read an article titled “Problem solving is an essential hacker skill” at https://null-byte.wonderhowto.com/forum/problem-solving-is-essential-hacker-skill-0150882/. The article says that problem solving, along with persistence and creativity, is an essential skill in this profession. So, I am posting some riddles as food for thought for our brains.

Riddles:

1.       A 10-year-old child kicks the ball. The ball travels a distance of 10 feet and come back to the child. How? — Ans: The child kicks the ball to the sky

2.       W is the father of M. But M is not W’s son. How? — Ans: M is W’s daughter

3.       What is that which goes up and comes down but does not move? — Ans: Stairs

4.       What is that thing that belongs to you but is used most by your friends and people who are familiar to you? — Ans: Your Name

5.       What is it that is blind, that can neither speak nor hear but always tells the truth? —- Ans: Mirror

6.       The more I grow the less visible I am to you. Who am I? —- Ans: Darkness

7.       What is it that vanishes the moment you call for it?  —– Ans: Silence

8.       Feed me and I will thrive. Give me water, I will vanish. Who am I? — Ans: Fire

9.       What is it that can be broken without touching it? —- Ans: Promise

10.   What is it that people always call for but are afraid of it? —- Ans: Truth

11.   What is it that stays with you all day long and never leave your side? — Ans: Shadow

12.   What is the word, when said, is always pronounced wrong? —- Ans: Wrong

  • « Go to Previous Page
  • Page 1
  • Page 2

Primary Sidebar

Weekly Discussions

  • Uncategorized (14)
  • Week 01: Overview (7)
  • Week 02: TCP/IP and Network Architecture (18)
  • Week 03: Reconnaisance (17)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (17)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (15)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (15)
  • Week 12: Web Services (25)
  • Week 13: Evasion Techniques (8)
  • Week 14: Review of all topics (15)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in