• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Main Content

“OceanLotus” targets BMW and Hyundai networks

December 10, 2019 By Jaimin Pandya Leave a Comment

APT hacker group “OceanLotus” apparently compromised network systems of automaker BMW and Hyundai by installing some hacking tool which would control and spy their systems. What they did was nothing new but it was sophisticated.

According to the article

“Created Fake Websites

To get access to other computers, the hackers created a fake website that gave the impression of belonging to the BMW branch in Thailand, as they can monitor networks and find out which folders and files that users logged in.

Hackers Observed for Months

The security team at BMW allowed hackers to stay active with an intention to know more details like, who they were, how many systems they managed to compromise, and what kind of data they were after.

Based on sources, no sensitive information was accessed by hackers during the incident and no primary computers were compromised.

BMW declined to provide additional information on the attack.

“We have implemented structures and processes that minimize the risk of unauthorized external access to our systems and allow us to quickly detect, reconstruct, and recover in the event of an incident,” BMW said in a statement.”

Source Article: https://www.cisomag.com/apt-hacker-group-targets-bmw-and-hyundai-networks/

 

Week 14 Presentation and Video

December 9, 2019 By Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-14

https://capture.fox.temple.edu/Mediasite/Play/63abf86c86f943eb85d5d510d1fc81231d

Week 13 Presentation and Video

December 9, 2019 By Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-13

https://community.mis.temple.edu/mis5211sec001fall2019/

Google Warns LastPass Users Were Exposed To ‘Last Password’ Credential Leak

September 17, 2019 by Percy Jacob Rwandarugali 1 Comment

Google Project Zero is a team of highly talented security analysts with a brief to uncover zero-day vulnerabilities. If a vulnerability is found, Project Zero reports to the vendor concerned and starts a 90-day countdown for a fix to be issued before full public disclosure is made. LastPass is also in the security business, being one of the most popular password management solutions with more than 16 million users, including 58,000 businesses. Project Zero has just disclosed that a security vulnerability left some of those 16 million users exposed to the risk of credential compromise as, in an ironic twist, LastPass could leak the last password used to any website visited.

https://www.forbes.com/sites/daveywinder/2019/09/16/google-warns-lastpass-users-were-exposed-to-last-password-credential-leak/#5e161ec64600

 

 

Filed Under: Uncategorized Tagged With:

LastPass Patches Bug Leaking Last-Used Credentials

September 16, 2019 by William Ha Leave a Comment

LastPass is a password manager that stores encrypted passwords online and provides users easy access to them through a web interface, browser plugins and smartphone apps. The vulnerability allowed an attacker to exploit a flaw in Chrome and Opera extensions to expose the last credentials filled by LastPass. It was eventually patched. To me, this vulnerability really highlights the biggest flaw of password managers. The tool that is supposed to protect you is actually the thing that can cause the most harm. I’m interested to know if anyone in class has experience with password managers and if you would recommend using one.

https://www.securityweek.com/lastpass-patches-bug-leaking-last-used-credentials

Filed Under: Uncategorized Tagged With:

Kali ISOs and VMs (Continue)

September 16, 2019 by Jiahao Karl Li Leave a Comment

<https://www.youtube.com/watch?v=pSJScUhJgJI>

I used the Kali ISO image to build Linux in VMware Workstation, configured 2oGB disk and 4GB memory, and then followed all default choices throughout the process. However, I got stuck at booting screen with “_” flashing after the installation before log-in. I found this video and eventually got it fixed. When you get to the “GRUB boot loader” menu, you should choose “/dev/sda” instead of the default choice “Enter device manually”. If you got the same problem, that should solve it. Excuse me for not having tried VirtualBox and pre-built Kali image yet. Therefore, I have no solution to problem regarding those.

Filed Under: Uncategorized Tagged With:

The Power of Social Engineering

September 15, 2019 by Xiduo Liu Leave a Comment

Social engineering and spear-phishing combined with malware and vulnerabilities show us guarding valuable data, systems with technologies are never sufficient. End-user training and cybersecurity awareness programs are equally important.

See the hack just came to light in recent years:

https://cybersguards.com/north-korean-hackers-infiltrate-the-atm-network-in-chile-following-an-interview-with-skype/ (Links to an external site.)

Such hacks would never happen if training and cybersecurity awareness programs are in place and required for all employees.

Filed Under: Uncategorized Tagged With:

Hackers Could Turn Pre-Installed Antivirus App on Xiaomi Phones Into Malware

September 15, 2019 by Daniel Bavaro Leave a Comment

https://thehackernews.com/2019/04/xiaomi-antivirus-app.html

I have always been a fan of Android over iOS, but I found this headline to be too awesome to pass up. Certain Xiaomi phones come pre-loaded with an Antivirus app suite called Guard Provider. The main feature of Guard Provider is that it helps to facilitate you choosing an antivirus app, from a list of 3: Avast, AVL or Tencent. I supposed they did this, so that they didn’t have to develop an antivirus app themselves, but also didn’t want to prevent the customers from being able to have some flexibility in which AV app they wanted to use. Not sure why they would do this, since Android let’s you add and remove apps as you please, for the most part. The problem with Guard Provider is that it used an unsecure HTTP connection for downloading AV signature updates and it also allowed the 3 SDKs from the 3 AV apps to co-exist and talk to each other. This combination could allow an attacker to perform and man in the middle attacker over that HTTP connection and slip malware into the download. They also apparently found a way to exploit that connection, so that they could access the user’s pictures, videos and other data. The software has since been patched.

Filed Under: Uncategorized Tagged With:

Article 2: IOS 13 Lock Screen Lets Anyone See Your Address Book

September 15, 2019 by Imran Jordan Kharabsheh Leave a Comment

This article, originally posted by the British publication The Register, highlights a vulnerability that was recently made public by a researcher that would allow an unauthorized user to gain access to the address book of any device using the iOS operating system. The publication and video that is included demonstrate how this exploit is replicated, albeit in a surprisingly simple way. All it requires is that someone calls the iOS device and opts to reply with a text message, thereby bypassing the lock screen and bringing you directly into the device’s address book. While the respond with a text feature can be disabled by delving through long list of sometimes complicated settings, this exploitable feature is always enabled automatically on all iOS devices. Being the owner of not one, but three apple products that use Apple’s iOS operating system, I am less than thrilled at the discovery of such a surface level GUI vulnerability. Thankfully, the article follows up by notifying people of a fix coming within the next two weeks that would remove this particular vulnerability permanently.

 

Source: https://apple.slashdot.org/story/19/09/15/004237/ios-13-lock-screen-lets-anyone-see-your-address-book

Filed Under: Week 02: TCP/IP and Network Architecture Tagged With:

Pen Testers Arrested

September 14, 2019 by Wade Mackey Leave a Comment

You may recall that I told the class to be clear on what is or is not included in your scoping document.  Here is an example of what can go wrong when this is not clear.

https://yro.slashdot.org/story/19/09/14/0322248/two-penetration-testers-arrested-for-attempted-burglary

Filed Under: Week 03: Reconnaisance Tagged With:

Kali ISOs and VMs

September 14, 2019 by Wade Mackey Leave a Comment

At the end of class, we did some work building VMs in both VirtualBox and VMWare and experienced some difficulties.

You can avoid this if you scroll to the bottom of the list and directly grab the already built VMs for either VMWare or VirtualBox.

https://www.kali.org/downloads/

Filed Under: Week 03: Reconnaisance Tagged With:

NSLookup

September 14, 2019 by Wade Mackey Leave a Comment

I misspoke in class about nslookup.  It is not deprecated.

Here’s a link with more info:

https://docstore.mik.ua/orelly/networking_2ndEd/dns/ch12_01.htm

Filed Under: Week 03: Reconnaisance Tagged With:

Week 3 Presentation and Video Link

September 14, 2019 by Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-3

https://capture.fox.temple.edu/Mediasite/Play/57fdca16a5d74b71ac48cff0076fd7ab1d

Filed Under: Week 03: Reconnaisance Tagged With:

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 13
  • Page 14
  • Page 15
  • Page 16
  • Page 17
  • Page 18
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in