• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Week 09: Web Application Hacking

Article 9: Microsoft Announces Plan To Support DoH In Windows

November 18, 2019 by Imran Jordan Kharabsheh Leave a Comment

In a bid to improve end-to-end cyber security and improve privacy controls for all Windows users, Microsoft has begun the planning phase in the implementation of DNS Over HTTPS (DoH). The Microsoft team has already laid out the their standards and guiding principles of this implementation project, which include: Windows DNS needs to be private and functional by default, users (familiar and unfamiliar) are required to set DNS configuration, streamline the process of DNS configuration for all users, and Windows should never fallback to unencrypted DNS without explicit permission from the administrator.

Source: https://yro.slashdot.org/story/19/11/18/1929229/microsoft-announces-plan-to-support-doh-in-windows

Filed Under: Week 09: Web Application Hacking Tagged With:

5 Places Where Hackers Are Stealthily Stealing Your Data In 2019

October 31, 2019 by Numneung Koedkietpong Leave a Comment

The article states that there are top five places in 2019 where hackers can steal corporate and government data without detection. The details are as follow;

  1. Misconfigured cloud storage: “(ISC)² Cloud Security Report 2019 assets that 64% of cybersecurity professionals perceive data loss and leakage as the biggest risk associated with the cloud.” In order to mitigate this, a cloud security policy should be established and regularly updated inventory of cloud infrastructure.
  2. Darkweb: “Notorious Collection #1, revealed in 2019 by security expert Troy Hunt, is a set of email addresses and plaintext passwords totaling 2,692,818,238 rows”. To protect, set up holistic password policy and incident response plan.
  3. Abandoned and unprotected websites: “The same report revealed that 25% of e-banking applications were not even protected with a Web Application Firewall (WAF). Eventually, 85% of applications failed GDPR compliance tests, 49% did not pass the PCI DSS test.” To mitigate, the in-depth web penetration testing should be conducted.
  4. Mobile Applications’ backends: There is a vulnerability on API. To protect, conduct mobile penetration testing.
  5. Public code repositories: Some organization store high sensitive data in the open and accessible repositories like GitHub. To mitigate this, the policy related to code storage and access management should be established and then enforcing it to both internal and third-party.

Filed Under: Uncategorized, Week 09: Web Application Hacking Tagged With:

Georgia ‘I’ll Be Back’ Cyber Attack Terminates TV, Takes Down 15,000 Websites

October 31, 2019 by Percy Jacob Rwandarugali Leave a Comment

A “massive” cyber-attack against multiple targets in Georgia has taken place on October 28, as the BBC and other media reported.

Not only has this seen thousands of websites impacted but two Georgian TV broadcasters, Imedi TV and Maestro, were temporarily taken offline as well. Critical national infrastructure, however, would appear not to have been affected.

Filed Under: Week 09: Web Application Hacking Tagged With:

Week 9 Presentation and Video

October 31, 2019 by Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-9

 

https://capture.fox.temple.edu/Mediasite/Play/19ca5f5e1b8f452cad8debc470df07871d

Filed Under: Week 09: Web Application Hacking Tagged With:

Data breach causes 10 percent of small businesses to shutter

October 30, 2019 by Penghui Ai Leave a Comment

People are aware that the impact of data breach will be more severe for big company like Facebook and Target, but it could be more serious for small company because it could cause the bankruptcy in the end. This article shows the results of a survey of 1,008 small businesses with up to 500 employees to prove it. This survey found that 10 percent of the business went out of business, and 25 percent of them had to file for bankruptcy and 37 percent experienced a financial loss after suffering a data breach. 44 percent of these victims were from larger firms of 251-500 people, while 11 percent were companies with 10 or fewer workers. Even though these company has less probability to be the target of hackers and the scale of the organization determines the amount of losses it can suffer, the problem will become more severe for the organization itself based on poor cyber security policy.

https://www.scmagazine.com/home/security-news/data-breach-causes-10-percent-of-small-businesses-to-shutter/

Filed Under: Week 09: Web Application Hacking Tagged With:

Cyber Attack on Indian Nuclear Plant

October 30, 2019 by Xiduo Liu Leave a Comment

A government-owned entity – the Nuclear Power Corporation of India was one of the victims of the most recent high profile cyber-attacks. According to a statement released by the company, the attack was discovered on September 4, and no plant control systems were affected. “The investigation revealed that the infected PC belonged to a user who was connected in the internet-connected network used for administrative purposes. This is isolated from the critical internal network. The networks are being continuously monitored. The investigation also confirms that the plant systems are not affected.” According to the article by TNW, the attacks used malware to access the domain controller account that grants access and authenticates requests from other computers in the network.

Some additional information also provided in the article is the data collected by the malware was sent to a mounted drive via SMB and the drive and credential is statically encoded: net use \\\\10.38.1.35\\C$ su.controller5kk /user:KKNPP\\administrator

 

Filed Under: Week 09: Web Application Hacking Tagged With:

Android gets new security sandboxing features

October 29, 2019 by Daniel Bavaro Leave a Comment

https://www.itpro.co.uk/google-android/34657/android-gets-new-security-sandboxing-features

This article describes a new feature in Chrome and Android that aims to help with cross-site scripting attacks and other similar attacks. The feature isolates the data in each tab of Chrome and prevents them from reaching out and communicating with each other. So, some malicious code on Tab A, wouldn’t be able to pull your session or credentials from Tab B.

Filed Under: Week 09: Web Application Hacking Tagged With:

Hacking victim who paid Bitcoin ransom goes on to hack the hackers

October 29, 2019 by William Ha Leave a Comment

A ransomware victim who paid the attackers to decrypt his files gets revenge by hacking them right back. The German programmer released almost 3,000 decryption keys to assist others hit by the Muhstik ransomware, alongside free decryption software. What he did wasn’t legal, but it’s cool to see this vigilante type response to being hacked. Who knows? Maybe if situations like these happened more often, we’d see a decline in ransomware related attacks. Since the FBI warns companies not to pay the ransom anyway, the possibility of getting hacked right back could further deter ransomware attacks.

 

https://thenextweb.com/hardfork/2019/10/08/ransomware-bitcoin-hacker-cryptocurrency-muhstik-rekt/

Filed Under: Week 09: Web Application Hacking Tagged With:

Largest cyber-attack in Georgia’s history linked to hacked web hosting provider

October 29, 2019 by Rami Saba Leave a Comment

A hacker has defaced over 15,000 websites hosted on the infrastructure of Pro-Service, a Georgian web hosting provider, including government sites, local newspapers, and TV stations.

Yesterday, the country of Georgia suffered a major cyber-attack.  Over 15,000 websites were defaced with an image of former Georgian President Mikheil Saakashvili, with the text “I’ll be back” overlaid on top.  Two television stations went off-air following the attacks.  I did read in another article that one of the TV station’s equipment was actually destroyed by the attack.  A third TV station was affected, but did not go off-air.  Several newspaper sites were also brought down.  Many linked yesterday’s attack with a similar 2008 Russian attack that defaced government sites and hacked TV and radio stations.  Although currently there is no evidence to suggest it was Russian based, an investigation was started to identify the culprit.

Pro-Service, a local web hosting provider, took blame for the issue.  They admitted that a hacker breached its network and took down customer websites.

 

Filed Under: Week 09: Web Application Hacking Tagged With:

7.5 Million Records of Adobe Creative Cloud User Data Exposed

October 26, 2019 by Percy Jacob Rwandarugali Leave a Comment

Adobe secured a database with 7.5 million records belonging to Adobe Creative Cloud users. The cache was not protected in any way, allowing anyone access to client information if they knew how to find it. Although the details included are not highly sensitive, they could be used to launch better-crafted phishing campaigns against customers whose data was exposed.

https://www.bleepingcomputer.com/news/security/75-million-records-of-adobe-creative-cloud-user-data-exposed/

Filed Under: Week 09: Web Application Hacking Tagged With:

  • Page 1
  • Page 2
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in