• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Numneung Koedkietpong

Article2: Thousands of Google Calendars Possibly Leaking Private Information Online

September 19, 2019 by Numneung Koedkietpong Leave a Comment

I found this interesting because it is related to our assignment of “reconnasaince”. The article states the vulnerabilities of public share of google calendars. Avinash Jain, a security researcher from India said that it is convenient for organizations to share public calendars; however, these contain plenty of sensitive information such as event names, event details, location, or even meeting links which anyone can use Google search hacking query to gain this public information. In addition, hackers will use phishing technique in order to send a fake invitation link via google calendar to steal private information.

Source: https://thehackernews.com/2019/09/google-calendar-search.html

Filed Under: Uncategorized Tagged With:

The Hottest Malware Hits of the Summer 2019

September 11, 2019 by Numneung Koedkietpong 1 Comment

This article summarizes the popular malware hits during July and August 2019. These malware hits use several and advance techniques such as Changing hashes via file obfuscation to evade AVs, Using encrypted communication with C2 servers to foil EDRs, and Using feature manipulation and tampering to trick AI, machine-learning engines, and sandboxes. The following malware and ransomware attacks are listed;
– Fileless Attacks and Living-Off-The-Land (LOTL)
– (Jack-in-the-box)2
– Astaroth Malware
– Sodinokibi Exploits
– GermanWiper Ransomware
– MegaCortex Ransomware
– Silence APT Spreads Malware
– Turla Attacks

Source: https://thehackernews.com/2019/09/its-been-summer-of-ransomware-hold-ups.html

Filed Under: Uncategorized, Week 03: Reconnaisance Tagged With:

  • « Go to Previous Page
  • Page 1
  • Page 2

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in