• Log In
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Matthew Bryan

Attack the block – How a security researcher cracked 70% of urban WiFi networks in one hit

November 11, 2021 by Matthew Bryan 1 Comment

A CyberArk researcher, Ido Hoorvitch, identified that many urban areas have unsafe and weak WiFi passwords that can be easily cracked. Hoorvitch collected 5,000 Wifi hashes around his neighborhood using network sniffing equipment. These were run through CyberArk’s “monster” password cracking rig which used an exploit found in PMKID hashes.

Hoorvitch noted that many people use cell phone numbers as their WiFi password. This allowed him to crack numerous hashes, obtain passwords, and then access their networks. In the cases where a phone number was used, it took approximately nine minutes for each crack. If routers do not support roaming modes, then they are not susceptible to this attack. It is recommended that complex passwords should be used with secure encryption protocols. WAP/WAP1 should be disabled.

Author: Matias Madou
Published: October 20, 2021
Link

Filed Under: Week 12 Tagged With:

Scammers are emailing waves of unsolicited QR codes, aiming to steal Microsoft users’ passwords

November 7, 2021 by Matthew Bryan 3 Comments

Adversaries are taking advantage of increased QR code adoption by launching phishing campaigns using the technology. “Quishing” is the usage of a QR code lure to harvest credentials and/or deliver a malicious payload.

A recent phishing campaign contained a QR code that prompted users to scan it in order to listen to an “encrypted voicemail.” When users scanned the QR code they were directed to a fake Microsoft login page which harvested their credentials.

QR codes have seen increased adoption at restaurants and other venues that require hands free exchange of information. The recent campaign is a good reminder to be mindful of what you’re scanning and where it may take you.

Author: AJ Vicens
Published: October 26, 2021
Link

 

Tagged With: Week 11

Report Shows Appalling State of Employee Awareness of Common Cyber Security Risks

October 31, 2021 by Matthew Bryan 3 Comments

This is another article that shows the importance of security awareness training. In particular I thought the following findings were interesting:

  • Employee awareness of cyber security risks lowest in government and healthcare
  • COVID-19 disrupted employee cybersecurity training
  • Cybersecurity training has a positive impact on employee awareness

It’s always sobering to hear statistics about the present state of employee awareness. In particular, it was very concerning to see that healthcare and government sectors had the lowest awareness of cyber risks. This was surprising given the regulations that face both sectors.

Author: Alicia Hope
Published: October 25, 2021
Link

Tagged With: Week 10

OWASP’s 2021 List Shuffle: A New Battle Plan and Primary Foe

October 24, 2021 by Matthew Bryan 2 Comments

I thought this was timely given this week’s topic. OWASP recently refreshed their list of web application vulnerabilities which saw Code Injection Vulnerabilities being replaced by Broken Access Control as #1.

The article notes that this shifting in order was not due to “solving” Code Injection Vulnerabilities, but rather it illustrates how widespread Broken Access Control is in the field.  Broken Access Control “encompasses a wide range of coding flaws” that could “enable attackers to modify a URL, internal application state, or part of an HTML page.”  The category includes any instance where access control policies can be violated so that users can act outside of their intended permissions.

The updated OWASP list also debuted new categories on the list, including Insecure Design, Software & Data Integrity Failure, and Server-Side Request Forgery.

 

Author: Matias Madou

Published: October 20, 2021

Link

Filed Under: Week 6, Week 8 Tagged With:

Rickroll Grad Prank Exposes Exterity IPTV Bug

October 17, 2021 by Matthew Bryan Leave a Comment

I thought this was a pretty funny, although risky prank, that took advantage of a zero day vulnerability in Exterity’s IPTV system.  Minh Duong, a former student at Township High School District 214, identified this vulnerability and was able to take control of every TV within the district.  This allowed him to pull off the “Big Rick” which played Rick Astley’s classic “Never Gonna Give You Up” on every IPTV across the district.

The Exterity IPTV system runs networked Projectors and TVs across the Township School District.  The TV players can receive serial commands via a web interface and an SSH server which allows for centralized control. Duong noticed this set-up earlier on in highschool and was able to exploit the vulnerability, but didn’t do much with it initially.  He later got the idea for the “Big Rick” as a senior prank.

Duong was very clear that he was lucky that the administration didn’t pursue criminal charges against him for unauthorized access.  He notes in the article that people should  “never access other systems in an unauthorized manner without permission.”  The vulnerability has been reported to the manufacturer, although it’s unclear if this has been fixed.

 

Author: Becky Bracken

Published: October 14, 2021

Link: https://threatpost.com/rickroll-exterity-iptv-bug/175491/

Filed Under: Week 8 Tagged With:

Apple AirTag Bug Enables ‘Good Samaritan’ Attack

October 9, 2021 by Matthew Bryan 2 Comments

I thought this was interesting and relevant to our recent discussions about social engineering. Apple Air Tags are used to locate frequently lost devices. Finders of a tag can scan the device on their iPhone to reveal information about the tag’s owner if it’s in “lost mode.”  During the scan, the finder’s iPhone displays a custom web page with the owner’s phone number.

The Air Tag “Good Samaritan Attack” exploits a flaw in this process which does not sanitize the input to the phone number field.  This allows the bad actor to input anything they’d like into the field, e.g. a redirect to an iCloud phishing page.  The deployment is similar to USB baiting attacks where USB devices are dropped outside the target location.  The Good Samaritan picks up the device, scans the tag, and is redirected to the attack page. This is concerning as users are not as diligent with checking sites on mobile devices and it may not be clear that they are being redirected to a malicious site.

The researcher who found the bug, Bobby Rauch, reported that Apple was not responsive to his attempts to disclose the issue.  This has been a trend among security researchers that report issues to Apple.  Rauch stated that they never answered his questions about the bug bounty program and did not follow-up with their remediation plan.  Apple did ask that Rauch avoid publicizing his findings; however, he did not comply with this request, due to their lack of communication.

 

Article: Apple AirTag Bug Enables ‘Good Samaritan’ Attack

Author: Brian Krebs

Published: September 28, 2021

Link

 

Filed Under: Week 7 Tagged With:

Wanted: Disgruntled Employees to Deploy Ransomware

October 2, 2021 by Matthew Bryan 1 Comment

Cybercriminals are asking employees to install ransomware on their company’s network in exchange for a portion of the profits.  The article details security researcher, Crane Hassold’s, experience engaging with a scammer offering 40% of the multi-million dollar ransom. The actor disclosed to Hassold that he originally tried phishing senior executives unsuccessfully, which is why he’s reaching out to insiders and asking to partner.  Hassold was asked to install the Demonware ransomware strain which is freely available on Github.

Ransomware typically requires more sophistication to deploy.  The actor used techniques commonly associated with business email compromise to engage the user and manipulate them to act on their behalf.  It’s similar to other scams involving wire transfers, but the payload is ransomware.

Approaching employees directly is not new; however, there are growing concerns about disgruntled employees creating identities on the darknet and offering to launch insider attacks for a fee.  The article cites the Lockbit 2.0 ransomware-as-a-service gang that included a solicitation for insiders in the desktop wallpaper left behind on systems encrypted with the malware.

 

Article: Wanted: Disgruntled Employees to Deploy Ransomware

Author: Brian Krebs

Published: August 19, 2021 

Link: https://krebsonsecurity.com/2021/08/wanted-disgruntled-employees-to-deploy-ransomware/

 

Filed Under: Week 6 Tagged With: Week 6

New macOS zero-day bug lets attackers run commands remotely

September 24, 2021 by Matthew Bryan 1 Comment

Researchers discovered a flaw in Apple’s MacOS Finder which allows for arbitrary command execution on Mac devices.  This was previously thought to be remediated, notably without a CVE number, but a workaround was found. The exploit occurs when an INETLOC file is opened which contains the File:// prefix.  These files are bookmarks that can be used to open online resources such as: (news://, ftp://, afp://) or local files (file://).

Apple’s previous patch only blocked the all lowercase file:// prefix.  Different cases, e.g. File://, fiLe://, can bypass the check added by the prior patch.  The vulnerability can be exploited via email  by including an INETLOC file as an attachment. This is particularly concerning as commands embedded by an attacker can be executed without prompting the user. Exploit proof of concepts went undetected by antimalware programs.

 

Article: New macOS zero-day bug lets attackers run commands remotely

Author: Sergiu Gatlan

Published: September 21, 2021 

Site: bleepingcomputer.com

Link: https://www.bleepingcomputer.com/news/apple/new-macos-zero-day-bug-lets-attackers-run-commands-remotely/

Filed Under: Week 5 Tagged With:

Kali Linux 2021.3 released with new pentest tools, improvements

September 19, 2021 by Matthew Bryan 2 Comments

I thought this article was timely as we’re just getting started with Kali.  The latest version of Kali includes a new set of tools, improved virtualization support, and new OpenSSL configurations.  These new additions may come in handy later in the course as we explore related topics. 

Highlights of this release include:

  • Wide default compatibility for OpenSSL
    • Enables older, insecure protocols in OpenSSL to increase the attack surface for penetration testing.
  • New Tools
    • HostHunter looks particularly interesting for hostname recon. 
  • Improved VM support
    • The Live image can be used in a virtualized environment and supports copy, paste, and drag/drop functionality natively.
  • Smartwatch support for Kali NetHunter  
    • This looks super cool and supports Bad USB and NMap scans.  
  • Improved ARM support for devices like the Raspberry Pi.

Users can update by downloading the latest ISO at http://cdimage.kali.org/kali-2021.3/ or follow the upgrade instructions detailed in the article.  

Article: Kali Linux 2021.3 released with new pentest tools, improvements

Author: Lawrence Abrams

Published: September 15, 2021

Link:https://www.bleepingcomputer.com/news/security/kali-linux-20213-released-with-new-pentest-tools-improvements/

Tagged With: Week 4

The Increase in Scope of Cybersecurity from Software to Hardware Protection

September 19, 2021 by Matthew Bryan 1 Comment

Consumer focused hardware companies are delivering more products than ever before due to the popularity of IoT technology. IoT devices promise to save consumers time and money by automating repeat takes and applying insights that previously weren’t possible. “The GSM Association estimates that by 2025 there will be almost 25 billion IoT devices deployed in the world.” The prevalence of IoT hardware comes with an increased cybersecurity risk.

Connected hardware has an increased cybersecurity risk because it is tangible. In other words, it can directly affect the world in which it resides.  The article provides an interesting example of a robot being compromised and directed to move to a new location to be sold for parts.

The author provides a few suggestions for hardware manufacturers to pursue to help increase cybersecurity in their products.

  • Design with cybersecurity in mind and allow products to be updated in response to new threats.
    • Improve firmware verification and error checking.
    • Support for encryption methods like AES, DES, etc.
    • Adding secure key storage 
  • Expand Data Access Controls
    • User vetting and verification must be added to the user authentication pipeline. 
      • “Keys and other access mechanisms are methods, they are not proofs of identity. We cannot blindly trust the keyholder. This is security backward. The keyholder must be vetted as well.”
  • Increase CIO/CISO Roles in hardware IoT companies
    • Companies cannot afford to risk losing competitive advantages by not having CIO/CISO

Article: The Increase in Scope of Cybersecurity from Software to Hardware Protection

Author: Neil Okikiolu

Published: September 8, 2021

Link: https://cisomag.eccouncil.org/the-increase-in-scope-of-cybersecurity-from-software-to-hardware-protection/

Tagged With: Week 3

  • Page 1
  • Page 2
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (1)
  • Week 1 (1)
  • Week 10 (1)
  • Week 11 (1)
  • Week 12 (2)
  • Week 2 (2)
  • Week 3 (1)
  • Week 4 (2)
  • Week 5 (3)
  • Week 6 (2)
  • Week 6 (0)
  • Week 7 (5)
  • Week 8 (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in