• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Week 3 Presentation

September 15, 2020 by Wade Mackey 1 Comment

Intro-to-Ethical-Hacking-Week-3

Filed Under: Week 03: Reconnaisance Tagged With:

Reader Interactions

Comments

  1. Kyuande Johnson says

    September 20, 2020 at 6:15 pm

    Kyuande Johnson
    Ethical Hacking
    Passive Reconnaissance

    McKean Defense Group

    McKean Defense is an employee-owned Naval Life Cycle Management, Engineering, and Program Management business headquartered in Philadelphia, PA. McKean Defense’s engineers work to deploy new shipboard technologies, integrate information technology across shipboard platforms, and develop strategies to support the Warfighter.

    The company’s website http://mckean-defense.com/ IP: (70.35.201.37) contains information about executive leadership and details about services provided to Navy Programs. McKean Defense was founded in 2006 by CEO Joe Carolini, Vice President Larry D. Burrill, and Leonard F. DeStefano. Executive board members include Roberta Chagnot (Chief Marketing Officer), Mike Denny (Chief Strategy and Growth Officer) Stuart Macaleer (Chief Financial Officer) Christine Pingelli (Chief Human Resources Officer). McKean Defense has locations in the District of Columbia, California, Virginia, and Pennsylvania.
    The company website also contained brief information about Naval programs. Mckean Defense has information uploaded into the Naval Tactical Command Support System (NTCSS) to ultimately support their operations. McKean Defense database administrators collect, verify data accuracy, and enter information from the various activities.
    The NTCSS database provides ships force the capability to manage and maintain personnel records consisting of more than sixteen thousand records, material and parts information for identifying equipment onboard for approximately one hundred eighty thousand items, and material and parts information for approximately thirty thousand items. Displaying this information publicly exposes the fact that McKean has access to Navy Database. Which can motivate adversaries to target Mckean Defense Engineers to gain access to the NTCSS database.

    Linkedin provided a wealth of information about the technology used in the company. After searching the profiles of many Engineers and IT Specialists. There was some useful information about the technology being used in the company. McKean Defense manages its users with Active Directory. Which means that McKean operated under a Windows Environment. Discovered that they operate under Microsoft Azure. This means that McKean users are using Microsoft Office Products and Authenticating with Microsoft Authenticator. Having Knowledge of the software being used can motivate adversaries to discover vulnerabilities for software that happen to be outdated and running on McKean’s Systems.
    McKean uses Spiceworks as its Ticketing System. They are partnered with Datto Cyber Security Company.

    Using Google Hacking Queries I discovered McKean Defense’s Password Reset Portal and McKean’s password structure. I discovered the password query by using the search query site:mckean-defense.com. Using this filtered all searches to McKean Sites only. I ended up discovering that there is an online password portal. To find the username/email sequence I filtered searches for McKean PDF documents. (filetype:pdf mckean defense) I ended up finding email addresses of employees in those documents. The email sequence is (First Letter of Name and Last Name @mckean-defense.com). Adversaries having this information can attempt to reset an employee’s password with the reset portal.

    McKean Defense username sequence could become a vulnerability when authenticating to Outlook email and the password reset portal. Adversaries can use this knowledge as an advantage to brute force Outlook email and the password reset portal. Unless McKean has some other alias form of the user name for authentication. Adversaries can continue to brute force passwords to attempt to gain unauthorized access and to deny service by locking users out.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in