• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Week 03: Reconnaisance

Article 3: FBI Investigating Alleged Hacking Attempt Into Mobile Voting App During 2018 Midterms

October 3, 2019 by Imran Jordan Kharabsheh Leave a Comment

This article speaks in regards to the beginning of a federal investigation into an attempted hack of an app that is still under development that would allow US citizens who are active military or registered for the right to vote abroad to place their votes through their phones. While the preliminary investigation by the organization and the federal prosecutors states that “no intrusion” had occurred and that the “integrity of the votes” were safe, they are executing an in-depth federal investigation. West Virginia Secretary of State Mac Warner also noted how this is partially a threat that any attempt to compromise an election will face thorough federal investigation and serious prosecution. Among the more interesting things discussed in the article regarding this app is how it’s developed to use blockchain technology as a means of ensuring the integrity of votes casted through the app. The article does note however that if the mobile device itself isn’t secure, then the app can be manipulated anyways.

Source: https://politics.slashdot.org/story/19/10/02/1922206/fbi-investigating-alleged-hacking-attempt-into-mobile-voting-app-during-2018-midterms

Filed Under: Week 03: Reconnaisance Tagged With:

Pen Testers Arrested

September 14, 2019 by Wade Mackey Leave a Comment

You may recall that I told the class to be clear on what is or is not included in your scoping document.  Here is an example of what can go wrong when this is not clear.

https://yro.slashdot.org/story/19/09/14/0322248/two-penetration-testers-arrested-for-attempted-burglary

Filed Under: Week 03: Reconnaisance Tagged With:

Kali ISOs and VMs

September 14, 2019 by Wade Mackey Leave a Comment

At the end of class, we did some work building VMs in both VirtualBox and VMWare and experienced some difficulties.

You can avoid this if you scroll to the bottom of the list and directly grab the already built VMs for either VMWare or VirtualBox.

https://www.kali.org/downloads/

Filed Under: Week 03: Reconnaisance Tagged With:

NSLookup

September 14, 2019 by Wade Mackey Leave a Comment

I misspoke in class about nslookup.  It is not deprecated.

Here’s a link with more info:

https://docstore.mik.ua/orelly/networking_2ndEd/dns/ch12_01.htm

Filed Under: Week 03: Reconnaisance Tagged With:

Week 3 Presentation and Video Link

September 14, 2019 by Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-3

https://capture.fox.temple.edu/Mediasite/Play/57fdca16a5d74b71ac48cff0076fd7ab1d

Filed Under: Week 03: Reconnaisance Tagged With:

The Hottest Malware Hits of the Summer 2019

September 11, 2019 by Numneung Koedkietpong 1 Comment

This article summarizes the popular malware hits during July and August 2019. These malware hits use several and advance techniques such as Changing hashes via file obfuscation to evade AVs, Using encrypted communication with C2 servers to foil EDRs, and Using feature manipulation and tampering to trick AI, machine-learning engines, and sandboxes. The following malware and ransomware attacks are listed;
– Fileless Attacks and Living-Off-The-Land (LOTL)
– (Jack-in-the-box)2
– Astaroth Malware
– Sodinokibi Exploits
– GermanWiper Ransomware
– MegaCortex Ransomware
– Silence APT Spreads Malware
– Turla Attacks

Source: https://thehackernews.com/2019/09/its-been-summer-of-ransomware-hold-ups.html

Filed Under: Uncategorized, Week 03: Reconnaisance Tagged With:

Foxit PDF Software Company Suffers Data Breach—Asks Users to Reset Password

September 11, 2019 by Penghui Ai Leave a Comment

The reason why I post this article is that I am a Foxit PDF software user with an account. From the article, we know that  unknown third-parties gained unauthorized access to Foxit’s data systems recently and accessed its registered users’ data, including user’s email addresses, passwords, users’ names, phone numbers, company names, and IP addresses. I use my Wechat account to access the Foxit, so I take this event very serious. However, I found that the Foxit annouce that users in China will not affect by this data breach because Chinese users do not use the same register path with users from other country. It is interesting that Foxit did not send any email or any kind of message to its Chinese users, at least I did not receive any. In addition, I do not know whether Chinese users is really safe in this event, so if you have any professional opinion about this event, welcome to share it on comments.

 

https://thehackernews.com/2019/08/foxit-pdf-reader-data-breach.html

Filed Under: Week 03: Reconnaisance Tagged With:

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in