• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Uncategorized

Windows & Linux get options to disable Intel TSX to prevent Zombieload v2 attacks

November 14, 2019 by Jiahao Karl Li Leave a Comment

A new vulnerabilities discovered earlier this week implied that companies’ CPUs are exposing to potential attacks from Zombiload. According to Intel, companies have the options to disable the updates to prevent the risk, but also need to make sure the system are away from impact and performance slow down.

 

ZDNET.com

Filed Under: Uncategorized Tagged With:

Qualcomm Chip Flaws Let Hackers Steal Private Data From Android Devices

November 14, 2019 by Numneung Koedkietpong Leave a Comment

The article states serious vulnerabilities which were found in Andriod smartphones using Qualcomm chipsets. Qualcomm’s Secure Execution Environment or QSEE is a hardware-isolated secure area on the main processor that aims to protect sensitive information and provides a separate secure environment (REE) for executing Trusted Applications. According to vulnerabilities, hackers can exploit system to gain credential and private data.

Source: https://thehackernews.com/2019/11/qualcomm-android-hacking.html

Filed Under: Uncategorized, Week 11: Intro to Dark Web and Intro to Cloud Tagged With:

Amazon’s Ring Video Doorbell Lets Attackers Steal Your Wi-Fi Password

November 8, 2019 by Numneung Koedkietpong Leave a Comment

The article states that researchers from Bitdefender have found that Amazon’s Ring Video Doorbell Pro device has IT vulnerabilities which attackers are able to exploit the system in order to hack WiFi password and launch a variety of cyberattacks using MitM against other devices connected to the same network. If hackers can gain unauthorized access to the system, they possibly can interact with all devices within the household network, intercept network traffic and run man-in-the-middle attacks, or access all local storage like NAS.

Filed Under: Uncategorized, Week 11: Intro to Dark Web and Intro to Cloud Tagged With:

5 Places Where Hackers Are Stealthily Stealing Your Data In 2019

October 31, 2019 by Numneung Koedkietpong Leave a Comment

The article states that there are top five places in 2019 where hackers can steal corporate and government data without detection. The details are as follow;

  1. Misconfigured cloud storage: “(ISC)² Cloud Security Report 2019 assets that 64% of cybersecurity professionals perceive data loss and leakage as the biggest risk associated with the cloud.” In order to mitigate this, a cloud security policy should be established and regularly updated inventory of cloud infrastructure.
  2. Darkweb: “Notorious Collection #1, revealed in 2019 by security expert Troy Hunt, is a set of email addresses and plaintext passwords totaling 2,692,818,238 rows”. To protect, set up holistic password policy and incident response plan.
  3. Abandoned and unprotected websites: “The same report revealed that 25% of e-banking applications were not even protected with a Web Application Firewall (WAF). Eventually, 85% of applications failed GDPR compliance tests, 49% did not pass the PCI DSS test.” To mitigate, the in-depth web penetration testing should be conducted.
  4. Mobile Applications’ backends: There is a vulnerability on API. To protect, conduct mobile penetration testing.
  5. Public code repositories: Some organization store high sensitive data in the open and accessible repositories like GitHub. To mitigate this, the policy related to code storage and access management should be established and then enforcing it to both internal and third-party.

Filed Under: Uncategorized, Week 09: Web Application Hacking Tagged With:

Facebook content moderation firm Cognizant quits

October 31, 2019 by Percy Jacob Rwandarugali Leave a Comment

It follows an investigation by The Verge into working conditions and the mental health of employees working at an Arizona moderation center on behalf of the social network.

Cognizant also has workers in India, Europe and Latin America.It is believed its decision will result in around 6,000 job cuts.

The firm told the BBC: “We have determined that certain content work in our digital operations practice is not in line with our strategic vision for the company and we intend to exit this work over time. This work is largely focused on determining whether certain content violates client standards – and can involve objectionable materials.

“Our other content-related work will continue. In the meantime, we will honor our existing obligations to the small number of clients affected and will transition, over time, as those commitments begin to wind down. In some cases, that may happen over 2020, but some contracts may take longer.”

In response, Facebook’s Arun Chandra said: “We respect Cognizant’s decision to exit some of its content review services for social media platforms.

https://www.bbc.com/news/technology-50247540

Filed Under: Uncategorized, Week 10: SecuritySheperd Tagged With:

Japanese Hotel Apologizes for Robots That Allowed Video and Sound to Be Hacked

October 26, 2019 by Rami Saba Leave a Comment

The Henn na Hotel in Japan has bedside robots that serve as guest assistants.  Several weeks ago, a researcher warned HIS Group that the bed-bots were easily accessible because they allowed unsigned code to run simply by tapping an NFC tag to the back of the robot’s head.  This allowed a hacker to remotely watch and listen through cameras and microphones in the robot.  He released a 0day vulnerability after the researcher had not heard back from the hotel for more than 90 days.  The hotel then apologized and fixed the robots.

The researcher’s twitter also makes for a good read.

The report also includes a note from a cybersecurity specialist.  Joseph Carson said such a vulnerability is not surprising and anything connected to the internet: a laptop, phone, webcam or hospitality robot, are all exposed to the risk of being hacked and abused.

https://www.securitymagazine.com/articles/91157-japanese-hotel-apologizes-for-robots-that-allowed-video-and-sound-to-be-hacked

Filed Under: Uncategorized Tagged With:

How to Avoid the Top Three Causes of Data Breaches in 2019

October 24, 2019 by Numneung Koedkietpong Leave a Comment

The article states that there are three main causes of data breaches in 2019 as following;

  1. Misconfigured cloud storage: most of companies don’t use encryption to protect data in cloud or don’t put any security access control as a standard. What’s more, they don’t concern about term and agreement.
  2. Unprotected code repositories: external software developers are the weakness because they lack of security traning awareness which allows attackers easily exploit to the systems.
  3. Vulnerable open source software: The companies still have the vulnerabilities of open source component, libraries, and frameworks. Patches are not regularly updated.

Therefore, five recommendations are provided;

  1. Maintain an up2date and holistic inventory of your digital assets
  2. Monitor your external attack surface and risk exposure
  3. Keep your software up2date, implement patch management and automated patching
  4. Prioritize your testing and remediation efforts based on risks and threats
  5. Keep an eye on Dark Web and monitor data leaks.

Source: https://thehackernews.com/2019/10/data-breach-protection.html

Filed Under: Uncategorized Tagged With:

Baltimore Reportedly Had No Data Backup Process for Many Systems

October 19, 2019 by Daniel Bavaro Leave a Comment

https://www.darkreading.com/attacks-breaches/baltimore-reportedly-had-no-data-backup-process-for-many-systems/d/d-id/1335953

This was an interesting read about a recent ransomware attack to hit the Baltimore government. Apparently, the attack resulted in large losses of key/critical data, that was only stored on user’s local computers. There are a few issues here and the article dives into each of them. First, why were users storing critical/key data locally on their computers? This data should have been stored in a centralized location. Second, this obviously was not a one-off situation. For the government to lose a lot of this data, it was not just a few people not following policies. This was a systemic method for storing and manipulating data. Is the IT department to blame for not implementing a workstation backup solution, to address this systemic problem? The data stored centrally was able to recover from the ransomware attack, but the workstation data was not.

Filed Under: Uncategorized Tagged With:

SIM Cards in 29 Countries Vulnerable to Remote Simjacker Attacks

October 17, 2019 by Numneung Koedkietpong Leave a Comment

The article states about “SimJacker” vulnerability which attackers are able to remotely attack to mobile phone. This involves a SMS containing a specific type of spyware-like code being sent to a mobile phone to exploit the presence of a particular piece of software of S@T Browser on the SIM card. This weakness has spread over 29 countries including North America, South America, Africa, Europe, and Asia.  In addition, there is android application like SnoopSnitch to detect the attack according to suspicious binary SMS and  the SIMalliance has also improved some updates to  S@T browser specifications to increase the security of the SIM toolkits.

Source: https://thehackernews.com/2019/10/simjacker-vulnerability-exploit.html

Filed Under: Uncategorized, Week 08: Malware Tagged With:

Signal Messenger Bug Lets Callers Auto-Connect Calls Without Receivers’ Interaction

October 11, 2019 by Numneung Koedkietpong Leave a Comment

The article states the vulnerabilities found in the messenger application called “Signal Private Messenger”. Natalie Silvanovich found a logical vulnerability for Andriod which allows a caller to mandate a call to be answered at the destination without requesting receivers’ interaction. “In other words, the flaw could be exploited to turn on the microphone of a targeted Signal user’s device and listen to all surrounding conversations.”
However, this issue was already solved by releasing patch management of “Signal for Android v4.47.7”.

Source: https://thehackernews.com/2019/10/signal-messenger-bug.html

Filed Under: Uncategorized Tagged With:

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Interim pages omitted …
  • Page 6
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in