• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Main Content

Spear-phishing Attack on Companies Involved in Covid-19 Vaccine Distribution

December 7, 2020 By Vraj Patel Leave a Comment

Hackers are targeting companies that are involved in distributing an Covid-19 Vaccines. Accordingly to a new research the attackers are performing an spear-phishing attack the organizations that are distributing Covid-19 vaccines since September 2020. IBM Security X-Force researchers said that the attacks are being aimed at vaccine cold chain. The companies are responsible for storing and delivering vaccines at a safe temperatures.

The US Cybersecurity and Infrastructure Security Agency (CISA) has also issued an alert informing an organizations that are involved in storing and delivering Covid-19 vaccines to review the indicator of compromise and increase their defenses.  It has been unclear if there were any of the phishing attacks were successful.  IBM has said that the attackers are trying to steal an credential for the companies to get access of their network and get unauthorized access to the sensitive information regarding to the Covid-19 vaccines.

 

References:

Lakshmanan, R. 2020. Hackers Targeting Companies Involved in Covid-19 Vaccine Distribution. Retrieved from: https://thehackernews.com/2020/12/hackers-targeting-companies-involved-in.html

New Week 14 Presentation

December 7, 2020 By Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-14 new

Week 14: In the News

December 6, 2020 By Kyuande Johnson Leave a Comment

Millions of Hotel Guests Worldwide Caught Up in Mass Data Leak

Due to a cloud misconfiguration users of a popular reservation platform threaten travelers with identity theft, scams, credit-card fraud and vacation-stealing. The misconfigured Amazon Web Services S3 bucket. Revealed the records include sensitive data and credit-card details. The Prestige Software’s “Cloud Hospitality” is used by hotels to integrate their reservation systems with online booking websites like Expedia and Booking.com.
The company was storing years of credit-card data from hotel guests and travel agents without any protection in place, putting millions of people at risk of fraud and online attacks, “The S3 bucket contained over 180,000 records from August 2020 alone. Many of them related to hotel reservations being made on numerous websites, despite global hotel bookings being at an all-time low for this period.”

In the News Article

September 21, 2020 by Rudraduttsinh Leave a Comment

A Vulnerability identified in Firefox for android could have been exploited to remotely open arbitrary websites on a targeted user’s phone without the need to click on links, install malicious applications, or conduct man-in-middle (MitM) attacks.

The flaw was discovered by researcher Chris Moberly in version 68 of the Firefox for android. According to Moberly, the vulnerability is related to Firefox periodically sending out SSDP discovery messages in search of a second-screen device that I can cast to. These messages can be seen by any device that is connected to the same LAN. AN attacker connected to the same WI-FI as a targeted user can deploy a malicious SSDP serves that is set up to respond with specially crafted messages that cause Firefox to open an arbitrary website. Further, Moberly mentions” had it been in the wild, it could have targeted known-vulnerable intents in other applications. Or it could have been used in similar to phishing attacks where a malicious site is forced onto the target without their knowledge in the hopes, they would enter some sensitive info or agree to install a malicious application (Kovacs, 2020). Moberly has released technical details and proof-of-concept (PoC) exploits. ESET researcher Lukas Stefano has confirmed that the exploit works and has posted a video showing how an attacker can open an arbitrary website on three phones at the same time.

 

References

Kovacs. Eduard. (September 21,2020). Firefox Flaw Allowed Hackers to Remotely Open Malicious Sites on Android Phones. Securityweek. Retrieved from https://www.securityweek.com/firefox-flaw-allowed-hackers-remotely-open-malicious-sites-android-phones

Filed Under: Week 04: Network Mapping and Vulnerability Scanning Tagged With:

In the news-Week 4

September 21, 2020 by Brian Schneider Leave a Comment

Zenscrape: A simple web scraping solution for penetration testers

This article is all about a software named zenscape. The basics of this software is web scraping. This tool has the crawler and the scraper combined into one tool. This is an important tool for penetration testers (according to the article) because web scraping is a crucial part of a successful business. During a pen test, it is important to test the computer systems, web applications, and networks to determine vulnerabilities. There are many tools for pen testing but this is an all in one tool that uses artificial intelligence tools to troubleshoot all security issues.

 

“Zenscrape: A Simple Web Scraping Solution for Penetration Testers.” The Hacker News, 17 Sept. 2020, thehackernews.com/2020/09/zenscrape-simple-web-scraping-solution.html?m=1.

Filed Under: Week 04: Network Mapping and Vulnerability Scanning Tagged With:

Reading Summary-Nessus

September 21, 2020 by Brian Schneider Leave a Comment

Nessus is an in house freeware utility that allows companies to scan for vulnerabilities automatically. The software tells them not only the vulnerabilities but also how to fix them. It is a proactive vulnerability scan that can identify vulnerabilities that may become dangerous. This software gives an idea of how an intruder would try to get in which allows the company to better protect itself. There is a downside however; if a vulnerability exists without a corresponding plug-in, the scanner will not find it. The overall goal of Nessus is to discover as many vulnerabilities as possible, decide how risky they are to your environment, and then reduce the risk that they pose.

 

Question

While this software is excellent to have a continually running automatic vulnerability, are there other processes that can pick up what Nessus misses?

Filed Under: Week 04: Network Mapping and Vulnerability Scanning Tagged With:

LockBit – Ransomware -as-a-Service

September 20, 2020 by Akshay Shendarkar 1 Comment

LockBit was first discovered in September 2019 under the name of .AbCD virus. They have evolved in leaps and bounds since then. A common methodology of this cyber crime gang is to target organizations which do not deploy two factor authentication or weak encryption algorithms for their VPN connectivity.
Another cybercrime gang, Maze, host some of the stolen data by LockBit on their servers, suggesting a collaboration between these two gangs. According to McAfee, LockBit mostly targets organizations located in the U.S., the U.K, France, Ukraine, Germany, India, China, and Indonesia.

References:
https://cyware.com/news/lockbit-a-new-entrant-taking-big-leaps-23850c68

Filed Under: Uncategorized Tagged With:

Readings Summary

September 20, 2020 by Akshay Shendarkar Leave a Comment

This week’s reading article summarized, the importance of performing in house scanning of IT Systems by organizations for vulnerabilities, to be up to date with the ever-changing threat landscape. The tool chosen in this article is Nessus, because of the automation it brings to ensure security of IT systems.
Nessus is freeware and does not require much processing power for hardware, it can be deployed on several systems throughout the network to scan different segments. The article delineates further on the installation and setup of Nessus tool. The scanner finds all the vulnerabilities associated with the plugins which are set before the scan is run, hence appropriate attention should be given in configuring Nessus. Discovered vulnerabilities are generally indicators of flawed security practices and policies. Hence it is important to evaluate the results of these vulnerability scans and close these vulnerabilities as per the risk appetite of the organization. The article also emphasizes that even though automated scanning tools like Nessus can help organizations in finding and remediating knows exploits and vulnerabilities, however, it is the security policies and good practices followed in the organization which are most important in securing the information.

Filed Under: Uncategorized Tagged With:

Week 4: Nessus

September 20, 2020 by Kyuande Johnson 1 Comment

Nessus is a remote security scanning tool, which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer you have connected to a network. Nessus discovers vulnerabilities for security specialist to analyze and harden their systems. Nessus Scans can become ineffective if ran behind a firewall. It’s always best to run a credentialed scan to receive full test results. Nessus Scan isn’t made to fully secure your environment as it doesn’t implement Physical or Access Controls.

Filed Under: Week 04: Network Mapping and Vulnerability Scanning Tagged With:

Week 4: In the News

September 20, 2020 by Kyuande Johnson Leave a Comment

Anglicare Sydney being held to ransom over sensitive data stolen from computer system

 

Anglicare Sydney is a community service organization that provides foster care and adoption services. As of Yesterday (Sept 20, 2020) Anglicare has confirmed that their sensitive data has been held for ransom. The ongoing investigation reported that 17 Gigabytes worth of sensitive data has been transmitted to a remote location. At this time Anglicare refuses to pay the ransom. Anglicare’s spokesperson hinted that the organization does not want to engage with cyber criminals. People receiving government services were entitled to have their personal identification protected. 

Anglicare has to eventually make a decision about resolving this issue. The integrity and security of the stolen data is detrimental. Many children could be at risk. 

 

Anglicare Sydney is contracted by the NSW Department of Family and Community Services to provide foster care and adoption services as well as programs for vulnerable families and young people 

Filed Under: Week 04: Network Mapping and Vulnerability Scanning Tagged With:

Reconnaisance

September 20, 2020 by Vraj Patel Leave a Comment

Reconnaissance is the first step of the penetration testing. There are two ways to perform reconnaissance: Passive and Active.

Passive reconnaissance is finding out information about the target within engaging with their network and finding available information about the target from that are available online or to public (Rouse, 2012). Active reconnaissance is finding out information about the target by engaging with its network.

Passive reconnaissance can be perform to find out information such as their email address, their system information using whois or Arin or any other different tools. Google hacking technique can be also used to find out information about the company. Active reconnaissance ca be performed using Nmap. Nmap can be used to find out about the open ports within their network.

 

References:

Rouse, M. 2012. Passive reconnaissance. Retrieved from: https://whatis.techtarget.com/definition/passive-reconnaissance#:~:text=Passive%20reconnaissance%20is%20an%20attempt,determine%20find%20any%20open%20ports.

Filed Under: Week 03: Reconnaisance Tagged With:

Mitigating DDOS Attack on IOT Devices

September 20, 2020 by Vraj Patel 1 Comment

Internet service providers can only detect the traffic of the network and they can only find out about Denial-of-service attack (DDOS ) attack once the attack has been executed (Dickson, 2020). Internet of Things (IoT) devices such smart cameras, lightbulb, fridge, and baby monitoring systems has a weak security and can be easily used to execute DDOS attack.

It is harder for the internet service provider (ISP) to find out about the vulnerable devices since they are behind the network address translation (NAT). The IoT devices also shares a common public address which makes it more complicated or the ISP to find out about any vulnerable IoT device within any home network.

To discover any vulnerable device within the network an detector can be placed between the router and the Optical Network Terminal (Dickson, 2020). The detector can be installed as an Raspberry Pi which will detect the traffic from the router and verify if there are any vulnerable IoT device within the network by comparing the CVE and NVD list of known vulnerability for home IoT devices. Once the vulnerable device is found then the detector can send an patch for the vulnerability and ISP can inform the user regarding the detecting and patching of their IoT device.

References:

Dickson, B. 2020. Artificial intelligence can stop IoT-based DDoS attacks in their tracks – research. Retrieved from: https://portswigger.net/daily-swig/artificial-intelligence-can-stop-iot-based-ddos-attacks-in-their-tracks-research

Filed Under: Week 04: Network Mapping and Vulnerability Scanning Tagged With:

Week 4 readings – Nessus

September 19, 2020 by Anthony Messina Leave a Comment

Nessus is a tool utilized across every organization. It helps find vulnerabilities on machines in a given environment. Nessus scans are instrumental in protecting an environment as they can scan an entire farm versus running through each server individually checking for vulnerabilities. It is important to note that Nessus will error on the side of caution and may report back many false positives. The article notes that while Nessus is very helpful in securing a network it is important to investigate all the vulnerabilities that it reports on and make sure they are not false positives.

 

 

Questions for the class:

What other vulnerability scans are utilized other than Nessus?

Filed Under: Week 04: Network Mapping and Vulnerability Scanning Tagged With:

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in