• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Mei X Wang

Wk# 12: Reading Discussions

November 17, 2020 by Mei X Wang Leave a Comment

XML Web Services Security and Web-based Application Security

  • XML web services operate over standard protocols/technologies
    • XML, HTTP, TCP/IP, SMTP
    • De Facto today is HTTP protocol
  • Web-based services: vulnerabilities within infrastructure
    • ex. web application published, the entire world is invited to send HTTP requests
    • attacks can be buried and past firewalls/filters/platform/intrusion detection
    • Defenses used can be parameter validation on
      • The data type (string, integer, real, etc) ·
      • Allowable character set
      • Minimum and maximum length
      • Whether a null is allowed or not
      • Whether the parameter is required or not
      • Whether duplicates are allowed
      • Numeric ranges · enumerated values · specific patterns
      • etc

Discussion  Questions:

  1. What web-based services do you use most commonly in your day-to-day operations?
  2. Have you encountered a situation where a web-based vulnerability were exploited?

Filed Under: Week 12: Introduction to Wireless Security with WEP and WPA2 PSK Tagged With:

In the News: Week #12

November 17, 2020 by Mei X Wang Leave a Comment

ICE Operations Arrests 113 Child Predators

The United States and Brazil have been working together to arrest 113 people suspected of producing and sharing Child Sexual Abuse Material.

US Immigration and Customs Enforcement, Homeland Security, and Brazil Ministry of Justice and Public Security made arrests through the US and South America during Operation Protected Childhood. OPC VII was a team that worked with the Cyber Crimes Center to find perpetrators in Brazil, Argentina, Paraguay, and Panama. Similarly in the US, HSI has executed 13 child exploitation search warrants and has made 9 arrests for child exploitation offenses. Many criminals were suspected of posting CSAM content on the social media app, KIK. Other apps such as Facebook Messenger and Twitter supplied information helping make these arrests. Since the launch of operation OPC, the operation has helped make 781 arrests and 1383 search warrants have been executed due to their findings. Dozens of minors were rescued a well.

 

https://www.infosecurity-magazine.com/news/ice-operation-arrests-113-child/

Filed Under: Week 12: Introduction to Wireless Security with WEP and WPA2 PSK Tagged With:

Week #11: In the News

November 9, 2020 by Mei X Wang Leave a Comment

The UK in Cyber-War against Anti-Vaccine Propaganda

Britain is taking caution about hostile states and terror groups spreading the anti-vaccine propaganda. They created a digital offensive toolkit operation to prevent the circulation of this propaganda, this toolkit is created to tackle disinformation and Islamic state recruitment material.

The group GCHQ has been ordered to take anti-vaxxers offline and monitor/disrupt terrorist propaganda. Most of the focus is on taking down state-linked content and encryption the data/cutting off communication on these cyber-actors. Most private users are not disturbed even if they post disinformation.

This was created to disrupt any lies about the virus and to protect the discovery of a safe vaccine.

https://www.infosecurity-magazine.com/news/uk-in-cyber-war-against-anti/

Filed Under: Week 11: Intro to Dark Web and Intro to Cloud Tagged With:

Week #10: Reading Discussions

November 2, 2020 by Mei X Wang Leave a Comment

Burp Suite Guide:

  • Burp proxy: used to intercept traffic between the browser and target application -> similar to a man-in-the-middle attack.
  • Burp Sitemap and Site proxy: shows sitemap and site scope -> lets you choose the scope of security testing
    • Displays various sections of a particular domain (ex. Google)
    • shows how to execute search
  • Burp Spider: used to get a complete list of URLs and parameters of each site. Looks through each page manually and finds the links within the testing scope.
    • Using spider: Proxy and interceptors should be off. -> Manually visiting more sites will give spider a larger coverage area.

Questions:

  1. Is Burpsuite similar to anything you have used before?
  2. What can be potential issues using this software?

Filed Under: Uncategorized Tagged With:

Week #10: In the News

November 2, 2020 by Mei X Wang Leave a Comment

Cyber-criminals Target Naked Zoom Users

Cybercriminals used a floating zero-day security vulnerability on the Zoom App to engage in sextortion scams. Many users such as TV Analyst Jeffrey Toobin was caught in a sexual act over the video call and the criminal managed to obtain the video recordings. Zoom’s vulnerability allowed attackers to take over the camera and also accessing metadata from the account.

The criminal sent emails to the victims explaining that he was under duress because he lost his job and had no other choice but to extort for money. The scammer sent emails threatening that a ransom of $2,000 in bitcoin within 3 days or the footage will be made public. There has not been public word from Zoom.

Filed Under: Uncategorized Tagged With:

Week #9: In the News

October 26, 2020 by Mei X Wang Leave a Comment

Nando’s Customers Hit by Credential Stuffing Attacks

The popular chicken chain, Nando’s, has been cyber-attacked; attackers hijacked online accounts to place large orders. Due to covid-19, the restaurant industry has been attempting to find a way to optimize service while restrictions are in places such as QR codes and online ordering. Most orders are made online and picked up using a QR code in-store, however, attacks have used a tactic called “credential-snuffing”. By using stolen customer credentials used elsewhere, they can use the same information to access their Nando’s account. Since then, Nando’s has promised to reimburse customers for any fraudulent orders.

Since July 2018- June 2020, there has been 64 billion credential snuffing attempts in the retail, hospitality, and travel sectors. This can be remediated by having MFA on accounts or even just using different passcodes for each account.

*I thought this was interesting because I was also hacked using a fake KFC account*

 

https://www.infosecurity-magazine.com/news/nandos-customers-hit-credential/

Filed Under: Uncategorized Tagged With:

Week #9 Reading Discussions: OWASP Top 10

October 26, 2020 by Mei X Wang Leave a Comment

OWASP Top 10

  • Broken authentication: when authentication and session management are implemented incorrectly, attacks can compromise the user’s credentials and exploit their identities. I see this happen frequently and there are industry standards such as lock-out policies, timeout sessions that can help mitigate this security risk. However, many organizations fail to do so because they are unaware of the severity of these flaws.
  • Broken access control is when restrictions on authenticated users are not properly reinforced. From a security standpoint, less is more. Users with administrative privileges should only be limited to admins of the system, if a standard user’s credentials were hacked and access controls weren’t in place, the scope of damage would increase significantly.

 

Questions

  1. What security risk have you encountered? Or what do you think can lead to the most damage?
  2. What are some mitigation tactics companies can have to protect themselves against these risks?

Filed Under: Uncategorized Tagged With:

Week #8 Reading Discussions: Malware

October 19, 2020 by Mei X Wang Leave a Comment

Malware

  • Described as malicious software intentionally designed to cause damage to a computer, server, client, or computer network. (ex.  computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, and scareware)
  • Detect/remove malware: windows defender/Malwarebytes
  • The term was coined by Yisrael Radai in 1990
    • first-known malware is Creeper: moved around different mainframes with a message that said “‘I’m the creeper: Catch me if you can.”
  • PUP(Potentially unwanted software): tricks users into installing into their systems through browser toolbars
    • can contain spyware functionality…not normally considered malware unless executes malicious features.

 

Questions:

  1. Have you ever encounter a malware attack? How and why?
  2. What can be used to defend against a malware attack?

Filed Under: Uncategorized Tagged With:

Week #8: In the News

October 19, 2020 by Mei X Wang Leave a Comment

Many Apple Users also use the navigation software app called Waze. Security engineer Peter Gasper found out when he was using the app’s web interface that it doesn’t just display his coordinates, it also displays the coordinates of the driver’s nearby. Each driver/account is assigned a unique ID and it doesn’t change over time. This means that if someone with malicious intent were to track a driver, they can also track the driver’s complete journey, what cities they go through, and their stops. This is incredibly dangerous because if there were any human trafficking/kidnappings to occur, the trafficker could’ve used Waze’s vulnerability to locate their target. This vulnerability has been patched since then but it’s interesting to think how as much as technology helps us, it can also make the world a more dangerous place.

 

https://www.infosecurity-magazine.com/news/waze-vulnerability-identifies-users/

Filed Under: Uncategorized Tagged With:

Wk #7: Reading Discussion

October 12, 2020 by Mei X Wang Leave a Comment

Social Engineering:

  • Human behavior of social engineering(attack vs. attacker): Financial gain, self-interest, Revenge, external pressures
    • Reverse social engineering: enticed to ask the aggressor for help(through tricking them), aggressor offers help just to make sure the victim remains unsuspicious while the attacker probes more
  • Counter-measures: creating controls (training/policies/security/management/…)
    • Perform regular reviews that the controls are working as created.
    • Simulate an attack(hire pen testing specialists)

 

Question for the class:

  1. Have you ever been a victim to social engineering?
  2. What’s one physical control that can be used to mitigate chances of a social engineering attack?

 

Filed Under: Uncategorized Tagged With:

  • Page 1
  • Page 2
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in