• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

William Bailey

Ethical Hacking

MIS 5211.701 ■ Fall 2020 ■ William Bailey
  • Home
  • INSTRUCTOR
  • SYLLABUS
  • Gradebook

Main Content

Week 12 & 13 – Wireless

December 1, 2020 By William Bailey 30 Comments

For this week’s discussion, research an article describing a breach where wireless (Wifi) was the entry point for the breach.

What weaknesses in the configuration did the attackers use to enter their target’s system?

What countermeasures would you implement if you wanted to defend against this breach?

Please include the URL for the article, so that others can read the article(s).

Week 11: Share Your Experiences – Security Shepherd

November 10, 2020 By William Bailey 22 Comments

During Week 11, what are your experiences with Security Shepherd?

Which deployment method (VMware / VirtualBox / Docker) did you choose, and why?

How many challenges did you complete?

When you encountered issues, what kind of steps did you take to resolve the issues and forge onward?

Week 09: In the News: Web Application Breach

October 26, 2020 By William Bailey 44 Comments

To help us understand what can be obtained via a web application that has vulnerabilities, or weaknesses, that an untrusted outsider can take advantage of.  Krebsonsecurity talks about a breach caused to a web application that they had purchased from Fiserv, resulting in customers being able to to view account data for other customers, including account number, balance, phone numbers and email addresses.  (https://krebsonsecurity.com/tag/fiserv/)

For this week, research a recent breach announcement that was attributed to a web application failure.  How did attackers misuse the website, and what were they able to obtain?  How could the breach have been averted?

 

Week 07: In the News – Social Engineering

October 18, 2019 by William Bailey 48 Comments

Social Engineering involves acting and using psychology to get information from a target.  As a follow-up to our discussions regarding social engineering, research an article of an incident where social engineering was essential for the incident / breach to have occurred.

In your post, include the URL so that others can read the article being referenced.

Filed Under: Week 07: Social Engineering Tagged With:

Week 08: SUDO CVE-2019-14287

October 17, 2019 by William Bailey 8 Comments

During this week we discussed the risks of malware that obtains the ability to operate within the kernel, and a Linux vulnerability  reported regarding SUDO when the SUDOers file is set up to allow all users except root to run certain programs as “SuperUserDO”, e.g. vi, the text editor.

https://thehackernews.com/2019/10/linux-sudo-run-as-root-flaw.html

With this week’s topic about malware, what does this vulnerability mean in regards to the likelihood and/or impact of the damage posted by malware?

 

Filed Under: Week 08: Malware Tagged With:

Week 6: Metasploit

October 1, 2019 by William Bailey 44 Comments

This week we discussed Metasploit Framework, and some of the vulnerabilities we demonstrated were from 2008.  For this week’s discussion, relate to the class a “hack” that involved a vulnerability that had been “in the wild” for at least six months.

NOTE: This is also the “In The News” for this week.

Note: Because we will be covering social engineering next week, this week’s hacks should be limited to technical attacks.

Filed Under: Week 06: Metasploit Tagged With:

Week 04 – Scanning

September 20, 2019 by William Bailey 7 Comments

This week we talked about initial scans using NMAP and NESSUS.  We also talked about using TCPDUMP as a packet sniffer.  As you work through your virtual environment this week, choose one (or more) of the following questions:

  1. What issue(s) are you encountering with NMAP, NESSUS, or other scanning tools?
  2. Did you discover any “interesting” traffic with TCPDUMP?
  3. How does practicing with a vulnerable device, such as the “MetaSploitable” help you learn more about vulnerability scanning and penetration testing?

 

Filed Under: Week 04: Vulnerability Scanning Tagged With:

Week 02: Reconnaissance

September 5, 2019 by William Bailey 17 Comments

One of the topics this week is about Reconnaissance, or learning about the target.  You may be hired to think just like an outsider, someone trying to “hack” their way in.  Remember that some of the “hacking” techniques may not require specific coding.  There are so many methods, that for this week’s question, everyone needs to post a unique method of performing reconnaissance in order to earn full points.  Describe the method of reconnaissance, and if possible, provide an example of a “hack” or other breach that can be tied back to the information learned due to reconnaissance.

I’ll start with an example that you’re likely seeing on television as part of New Jersey Transit’s “See Something, Say Something” campaign.  The commercial promotes security awareness, with several suspicious actors.  One of the scenes shows two people along the road, possibly looking at their potential target, but more specifically, another actor taking pictures, and the scene is shown from the viewpoint where we see that the pictures being taken are those of the CCTV system.  Why?   By taking pictures of the facility, the outsider is learning about the physical security controls of the facility, and can plan the attack to avoid the line of sight from these cameras.

Reconnaissance - Examining Physical Security Controls (Cameras)

Filed Under: Week 02: TCP/IP and Network Architecture Tagged With:

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3

Primary Sidebar

Weekly Discussions

  • Uncategorized (1)
  • Week 01: Overview (5)
  • Week 02: TCP/IP and Network Architecture (3)
  • Week 03: Virtualization (2)
  • Week 04: Vulnerability Scanning (2)
  • Week 05: System and User Enumeration (2)
  • Week 06: Metasploit (1)
  • Week 07: Social Engineering (2)
  • Week 08: Malware (2)
  • Week 09: Web Application Security (1)
  • Week 12: Wireless (2)
  • Week 14: Review of all topics (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in