• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Week 14: Jack the Ripper, Cain and Able, and Ettercap

Week 14 Presentation and Video

December 9, 2019 by Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-14

https://capture.fox.temple.edu/Mediasite/Play/63abf86c86f943eb85d5d510d1fc81231d

Filed Under: Week 14: Jack the Ripper, Cain and Able, and Ettercap Tagged With:

Chinese residents worry about rise of facial recognition

December 5, 2019 by Percy Jacob Rwandarugali Leave a Comment

A survey by a Beijing research institute indicates growing pushback against facial recognition in China.

Some 74% of respondents said they wanted the option to be able to use traditional ID methods over the tech to verify their identity.

Worries about the biometric data being hacked or otherwise leaked was the main concern cited by the 6,152 respondents.

Facial recognitions systems are being rolled out in stations, schools, and shopping centres across the country.

The survey, first reported in the West by The Financial Times, was released on Thursday by the Nandu Personal Information Protection Research Centre.

It has been described as being one of the first major studies of its kind into public opinion on the subject in mainland China.

Some 80% of respondents said they were concerned that facial recognition system operators had lax security measures.

 

https://www.bbc.com/news/technology-50674909

 

Filed Under: Week 14: Jack the Ripper, Cain and Able, and Ettercap Tagged With:

OnePlus Suffers New Data Breach Impacting Its Online Store Customers

December 5, 2019 by Penghui Ai Leave a Comment

As a smartphone maker, one plus is one of my favorite smartphones because of its high quality and reasonable price. In addition, they are really listening to users’ opinions on their community. The company discovered that some of our users’ order information was accessed by an unauthorized party last week while monitoring our systems. The company assured that not all customers were affected and that the attackers were not able to access any payment information, passwords, and associated accounts. The most serious influence would be phishing emails are sending out to the users. As a result of this breach, the company has also finally decided to launch an official bug bounty program by the end of December 2019. 

Filed Under: Week 14: Jack the Ripper, Cain and Able, and Ettercap Tagged With:

Kali Linux version 2019.4 now offers a Windows theme for the discreet hacker in all of us.

December 3, 2019 by Andrew P. Sardaro Leave a Comment

Offensive Security, creators of Kali Linux, released a new version of that can change your standard Xfce desktop environment into a Windows environment.

The theme is named ‘Kali Undercover,’ and was created for work in public places where discretion is required. I imagine that penetration testers, security researchers or hackers would find this theme beneficial.

Other updates included in this release version:

  • PowerShell Support —Execute PowerShell scripts directly on Kali.
  • Kali NetHunter KeX –Android device connectivity (HDMI and Bluetooth) for Kali desktop support on your smartphone.

https://thehackernews.com/2019/11/kali-linux-undercover-mode.html

 

Filed Under: Week 14: Jack the Ripper, Cain and Able, and Ettercap Tagged With:

HUMBLE BOOK BUNDLE: CYBERSECURITY 2019 BY PACKT – 6 Days left

December 3, 2019 by Michael Kalai Leave a Comment

HUMBLE BOOK BUNDLE: CYBERSECURITY 2019 BY PACKT

20 Cyber Security Books for $15 through humble bundle. Only 6 days left.

https://www.humblebundle.com/books/cybersecurity-2019-packt-books?hmb_source=humble_home&hmb_medium=product_tile&hmb_campaign=mosaic_section_2_layout_index_3_layout_type_threes_tile_index_1_c_cybersecurity2019packt_bookbundle

Filed Under: Week 14: Jack the Ripper, Cain and Able, and Ettercap Tagged With:

A list of major security incidents of this decade!

December 1, 2019 by Jaimin Pandya Leave a Comment

As we get closer to the end of the year and more importantly end of this most technologically advanced decade, here is a highlight of the all the major security cyber security incidents or events of 2010s. I found this article interesting because I wasnt truly aware of some of these incidents that had taken place in the earlier parts of this decade. In last 5 years alone, we have seen some monstrous data breaches, lots of hacking, cyber espionage and what not. It has truly been quite a decade from a cyber security perspective. This is a very detailed article with an insanely long list of data breaches and hacking incidents.

Source Link: https://www.zdnet.com/article/a-decade-of-hacking-the-most-notable-cyber-security-events-of-the-2010s/

 

Filed Under: Week 14: Jack the Ripper, Cain and Able, and Ettercap Tagged With:

1.2 Billion Records Found Exposed Online in a Single Server

November 24, 2019 by Michael Kalai Leave a Comment

1.2 Billion Records Found Exposed Online in a Single Server 

Here’s the next jumbo data leak, complete with Facebook, Twitter, and LinkedIn profiles.

“While the collection is impressive for its sheer volume, the data doesn’t include sensitive information like passwords, credit card numbers, or Social Security numbers. It does, though, contain profiles of hundreds of millions of people that include home and cell phone numbers, associated social media profiles like Facebook, Twitter, LinkedIn, and Github, work histories seemingly scraped from LinkedIn, almost 50 million unique phone numbers, and 622 million unique email addresses.”

https://www.wired.com/story/billion-records-exposed-online/

Filed Under: Week 14: Jack the Ripper, Cain and Able, and Ettercap Tagged With:

Amazon gets closer to getting Alexa everywhere

November 21, 2019 by Percy Jacob Rwandarugali Leave a Comment

“I test my own technology – with all of them being called Alexa, I see which one is waking up and whether it is the right device,” says the chief scientist of the AI division responsible for the tech.

That’s a lot of Alexa. But, it seems, still not enough.

In a one-on-one interview with the BBC, Mr Prasad discussed plans for Alexa to both become smarter and to follow users wherever they go. This is known in the trade as ubiquitous ambient computing, and Amazon hopes to corner the market.

In the US, it already sells an Echo system that plays Alexa through a car’s speakers. And Mr Prasad says he also wants the virtual assistant to accompany users as they walk about too.

To achieve this, he explains, the tech needs to get better at contextual reasoning.

“If you are in a store and you say, ‘Where are the tomatoes?’ it will need to have the context,” he says.

https://www.bbc.com/news/technology-50392077

Filed Under: Week 14: Jack the Ripper, Cain and Able, and Ettercap Tagged With:

Cybersecurity experts warn of Black Friday deals email scams

November 21, 2019 by Penghui Ai Leave a Comment

BlackFriday is approaching that might makes customers crazy about looking for tons of discount information to find the best possible deals online. At the same time, retailers might send out emails of discount information to their customers. However, cybersecurity experts have warned that consumers may be vulnerable to email scams during this annual shopping event. This big event every year could be a nightmare for cybercrime victims. Users can avoid being scammed by always checking customer reviews and complaints before downloading a new app or visiting an unfamiliar site. If the Black Friday deals look too good to be true, they probably are.

Cybersecurity experts warn of Black Friday deals email scams

Filed Under: Week 14: Jack the Ripper, Cain and Able, and Ettercap Tagged With:

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in