• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Week 09: Web Application Hacking

Week 9: Reading

December 6, 2020 by Kyuande Johnson Leave a Comment

Week 9’s reading contains OWASP top 10 Web Application Security Risk. The number one Web Application Vulnerability is Injection.  Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. A successful attack may result in the unauthorized viewing of user lists, the deletion of entire tables and, in certain cases, the attacker gaining administrative rights to a database, all of which are highly detrimental to a business.

Filed Under: Week 09: Web Application Hacking Tagged With:

Week 9: In the News Web Application

December 6, 2020 by Kyuande Johnson Leave a Comment

On Wednesday morning (ET), around 2,034 BTC ($21.6 million) from the 2016 Bitfinex hack moved into a few unknown wallets. The action was caught by the Btcparser program as five transactions with around 400 BTC each moved for the first time in four years. Around August of 2016 a very popular digital currency exchange Bitfinex. Most of the stolen bitcoins sat idle for a little less than four years, but in 2020 the hacker has been moving lots of coins in batches. The 2016 Bitfinex hack was one of the biggest cryptocurrency trading platform hacks when it happened. At the time, Bitfinex was one of the largest cryptocurrency platforms around. When the hack happened, Bitcoin price fell by 20%, affecting global cryptocurrency trades.

https://www.goodwinlaw.com/publications/2016/09/the-aftermath-of-the-bitfinex-hack

Filed Under: Week 09: Web Application Hacking Tagged With:

Windows 10, iOS, Chrome, Firefox and Others Hacked at Tianfu Cup Competition

November 9, 2020 by Chidiebele Okosi Leave a Comment

https://thehackernews.com/2020/11/windows-10-ios-chrome-firefox-and.html

This article is interesting to show that these applications vulnerabilities following the outcome of a bunch of hackers at a competition and the Patches for all the demonstrated bugs demonstrated are expected to be released in the coming days.

Multiple software products from Adobe, Apple, Google, Microsoft, Mozilla, and Samsung were successfully pwned with previously unseen exploits in Tianfu Cup 2020, the third edition of the international cybersecurity contest held in the city of Chengdu, China.

The hacking was done against these list of platforms

  • Adobe PDF Reader
  • Apple iPhone 11 Pro running iOS 14 and Safari browser
  • ASUS RT-AX86U router
  • CentOS 8
  • Docker Community Edition
  • Google Chrome
  • Microsoft Windows 10 v2004
  • Mozilla Firefox
  • Samsung Galaxy S20 running Android 10
  • TP-Link TL-WDR7660 router
  • VMware ESXi hypervisor

Filed Under: Week 09: Web Application Hacking Tagged With:

Accessing Google User’s Account Information using GHunt

November 2, 2020 by Vraj Patel Leave a Comment

GHunt is an open-source intelligence (OSINT) tool which can be used to explore the data that are created by the Google account (Pritchard, 2020). GHunt is an OSINT tool which uses an open source information to compile data of a user identities and activities. GHunt can be used to analyze the uses data by just having the users email address. GHunt can extract the users name, YouTube channel, and other Google Services.

GHunt tool was being developed by Thomas Hertzog. GHunt can be used by white hat and penetration tester to find out if the email address found during an testing can leak any other information. Individual and business can use this tool to identify how much of their information is available publicly.

References:

Pritchard, S. 2020. GHunt OSINT tool sniffs out Google users’ account information using just their email address. Retrived from: https://portswigger.net/daily-swig/ghunt-osint-tool-sniffs-out-google-users-account-information-using-just-their-email-address

Filed Under: Week 09: Web Application Hacking Tagged With:

Week 9 Presentation

November 2, 2020 by Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-9

Filed Under: Week 09: Web Application Hacking Tagged With:

In the News – Week 9 – FBI, CISA: Russian hackers breached US government networks, exfiltrated data

October 26, 2020 by Anthony Messina Leave a Comment

US government said that Russian state-sponsored hacking group has successfully breached US government networks.  The Russian hacker group was identified as Energetic Bear.  The group has been targeting numerous US state, local, territorial, and tribal government networks since February 2020.  The hacker group appeared to have breached the government servers by combining VPN appliances and Windows bugs.

The Russian attackers used publicy known vulnerabilities to breach networking equipment, pivot to internal networks, elevate privileges, and steal data.  The targeted devices included Citrix access gateways (CVE-2019-19781), Microsoft Exchange email servers (CVE-2020-0688), Exim mail agents (CVE 2019-10149), and Fortinet SSL VPNs (CVE-2018-13379).

Once in, the attackers used the Zerologon vulnerability in Windows Servers (CVE-2020-1472) to access and steal Windows Active Directory (AD) credentials. The group then used these credentials to roam through a target’s internal network.  Some of the data that was exfiltrated included:

  • Sensitive network configurations and passwords.
  • Standard operating procedures (SOP), such as enrolling in multi-factor authentication (MFA).
  • IT instructions, such as requesting password resets.
  • Vendors and purchasing information.
  • Printing access badges.

 

https://www.zdnet.com/article/fbi-cisa-russian-hackers-breached-us-government-networks-exfiltrated-data/#ftag=RSSbaffb68

Filed Under: Week 09: Web Application Hacking Tagged With:

Week 9 Readings – OWASP Top 10

October 25, 2020 by Anthony Messina Leave a Comment

This week’s readings had us view the OWASP top 10.  The OWASP (Open Web Application Security Project) is a super informative site.  It essentially outlines the top 10 web attacks the attackers are utilizing against web servers today.  This is useful as it gives you an idea of how attackers are exploiting environments.  It also helps IT departments assess their own externally facing servers for vulnerabilities.

 

Questions for the class:

SQL Injection is the number 1 threat on the OWASP top 10, how do SQL injections work?

Filed Under: Week 09: Web Application Hacking Tagged With:

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in