• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Main Content

Spear-phishing Attack on Companies Involved in Covid-19 Vaccine Distribution

December 7, 2020 By Vraj Patel Leave a Comment

Hackers are targeting companies that are involved in distributing an Covid-19 Vaccines. Accordingly to a new research the attackers are performing an spear-phishing attack the organizations that are distributing Covid-19 vaccines since September 2020. IBM Security X-Force researchers said that the attacks are being aimed at vaccine cold chain. The companies are responsible for storing and delivering vaccines at a safe temperatures.

The US Cybersecurity and Infrastructure Security Agency (CISA) has also issued an alert informing an organizations that are involved in storing and delivering Covid-19 vaccines to review the indicator of compromise and increase their defenses.  It has been unclear if there were any of the phishing attacks were successful.  IBM has said that the attackers are trying to steal an credential for the companies to get access of their network and get unauthorized access to the sensitive information regarding to the Covid-19 vaccines.

 

References:

Lakshmanan, R. 2020. Hackers Targeting Companies Involved in Covid-19 Vaccine Distribution. Retrieved from: https://thehackernews.com/2020/12/hackers-targeting-companies-involved-in.html

New Week 14 Presentation

December 7, 2020 By Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-14 new

Week 14: In the News

December 6, 2020 By Kyuande Johnson Leave a Comment

Millions of Hotel Guests Worldwide Caught Up in Mass Data Leak

Due to a cloud misconfiguration users of a popular reservation platform threaten travelers with identity theft, scams, credit-card fraud and vacation-stealing. The misconfigured Amazon Web Services S3 bucket. Revealed the records include sensitive data and credit-card details. The Prestige Software’s “Cloud Hospitality” is used by hotels to integrate their reservation systems with online booking websites like Expedia and Booking.com.
The company was storing years of credit-card data from hotel guests and travel agents without any protection in place, putting millions of people at risk of fraud and online attacks, “The S3 bucket contained over 180,000 records from August 2020 alone. Many of them related to hotel reservations being made on numerous websites, despite global hotel bookings being at an all-time low for this period.”

News Article – Fortigate VPN Default Config Allows MiTM Attack

September 28, 2020 by Akshay Shendarkar Leave a Comment

An interesting article has been written by SAM IoT Security Lab, regarding the VPN service being deployed using Fortigate’s VPN appliances.
A Shodan search turned up more than 230,000 vulnerable FortiGate appliances using the VPN functionality, researchers found. Out of those, a full 88 percent, or more than 200,000 businesses, are using the default configuration and can be easily breached in an MitM attack.
In the case of the FortiGate router, it uses a self-signed, default SSL certificate, and it uses the router’s serial number to denote the server for the certificate.
While the issue exists in the default configuration of the FortiGard SSL-VPN client, Fortinet does not consider the issue to be a vulnerability, because users have the ability to manually replace the certificate in order to secure their connections appropriately.

Filed Under: Uncategorized Tagged With:

Readings Summary

September 28, 2020 by Akshay Shendarkar Leave a Comment

This week’s reading article introduces us to ‘Netcat’ which has proven to be a very important tool for IT security admins in maintaining the security of their networks. Netcat is a Linux utility program which is used for reading and writing data using TCP and UDP protocols across networks. Netcat is very strong in creating connections using port filtering, with network devices, hence it is also used as a network debugging tool. The article illustrates further on various uses or circumstances in which netcat can be used by security admins as well as the relevant syntax which is used for carrying out specific actions using this tool.

Filed Under: Uncategorized Tagged With:

In the news article

September 28, 2020 by Rudraduttsinh Leave a Comment

Twitter bug may have exposed API keys, access tokens

 

A bug could have exposed their API keys and access tokens in their browser’s cache. Luckily, the problem was fixed before any leaks. According to the twitter, if the person using a public computer to view developer app keys and token on developer.twitter.com, they may have been store temporarily in the browser’s cache on the computer. That information has the potential of being misused by accessing the keys and tokens. With more and more organizations and businesses relying on the API, this makes API a lucrative target for hackers. Leaked keys and token can make their way to the dark and possess a threat of being used in the automated attacks against API endpoints.  Twitter notified that they changed their caching instructions that the site sends developer’s browsers.  Twitter also stopped storing information about the apps or accounts and fixed the leak.

 

Filed Under: Week 05: Metasploit Tagged With:

Week 5 – Readings: Netcat

September 27, 2020 by Anthony Messina Leave a Comment

Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol.  It is designed to be a back-end tool that can be used directly or easily driven by other programs and scripts.  At the same time, it is packed with other features such as port scanning or copying files over the network without having a FTP or HTTP server.  Netcat is often used by hackers to achieve a shell on a victim’s computer.  If a hacker was able to breach a website, they could upload a shell script to the site.  The script would be modified to connect to the attackers IP, on a given port, say 9999.  Once the shell is uploaded, the attacker would setup a netcat listener on their machine with the commands:

nc –nvlp 9999

This essentially tells netcat (nc) not resolve names (-n), to be verbose printing out when a connection occurs (-v), to listen (-l) on a given local port (-p)

Once the listener is set, the attacker would navigate to the page were they uploaded the shell script, and it would execute and then there would be a shell prompt in the terminal where the netcat listener was set.

Questions for the class:

What else can netcat be used for?

Filed Under: Week 05: Metasploit Tagged With:

Week 5: In the News

September 27, 2020 by Kyuande Johnson Leave a Comment

Nebraska Medicine Falls Victim To Cyber Attack

Nebraska Medicine is the most comprehensive health network in the region, with two major hospitals, more than 1000 doctors and 40 clinics in the Omaha area. Earlier this week Nebraska Medicine experienced a significant information technology system downtime event. This downtime is the result of a cyber security attack.  Nebraska Medicine was forced to postpone many appointments and prioritized patients who have appointments or surgeries critical to their health and well-being. According to Nebraska Medicine no patient data has been deleted or destroyed. As of this time there is no report of Patient data being compromised. Law Enforcement have been notified and contingency plans are in place. Nebraska Medicine says normal operations should resume in a few days after the cyber attack. 

The statement did not include any further information about the attack’s nature, extent or origins. According to the distribution and event leading to the discovery of the attack. It seems that Nebraska Medicine has been affected by a denial of service attack. As this investigation continues Nebraska Medicine and other health institutions should seek to improve their Security Awareness. Training employees to watch out for suspicious links and always updating phone and computer software is essential . Nebraska Medicine should also improve defense-in-depth or layered security. Layered Security provides additional protection even after an unauthorized access is achieved. Even if an attacker is able to breach into the network.What they can access is very limited. Which is going to make accessing other data more difficult.

Filed Under: Week 05: Metasploit Tagged With:

Week 5 – In the News: You can bypass TikTok’s MFA by logging in via a browser

September 26, 2020 by Anthony Messina Leave a Comment

One month after TikTok implemented MFA for its users, it was discovered that the feature was only enabled for the mobile app and not the website.  This lapse in TikTok’s new security feature would allow attackers to bypass MFA by logging into an account with compromised credentials via its website.  Luckily there is not much an attacker can do to a compromised account when logging into TikTok via the website.  The website dashboard does not allow passwords to be reset.  However, an attacker could still deface an account by uploading and posting videos in an attempt to deface the account.  Another flaw found in TikTok’s platform was that the mobile app does not show sessions taking place in real-time from the web dashboard.  This means that TikTok does not warn users when someone used their credentials to access their TikTok account via a web browser.

 

https://www.zdnet.com/article/you-can-bypass-tiktoks-mfa-by-logging-in-via-a-browser/

Filed Under: Week 05: Metasploit Tagged With:

WK #5: Reading Discussions

September 24, 2020 by Mei X Wang 1 Comment

Netcat= The TCP/IP Swiss Army Knife

  • Netcat is used to write and read data across TCP/UDP network connections. It can be used to debug and explore target networks. It can create just about any network connections.
  • Netcat can be used to scan ports, test firewalls, proxy gateways, script backends, and more.
  • Using NetCat to remote command prompt: “nc -1 -p1234 -d -e cmd.exe -L”
    • Using Netcat to listen to port 1234, while running detached from the console, and execute command prompt when the connection is made.

 

  1. NetCat is an extremely useful tool because it not only can scan for open ports, but it can also utilize these open ports to take over the target machine. What precautions can be made to avoid being exploited?
  2. What are some ways hackers are able to hide NetCat on the target system?

Filed Under: Uncategorized Tagged With:

WK #5: eBay Execs Plead Guilty to Cyber-Stalking

September 24, 2020 by Mei X Wang Leave a Comment

Four former eBay executives have pleaded guilty for cyber-stalking and intimidating a Massachusetts couple. The married couple works as an editor and publisher; in their online newsletter, they wrote posts criticizing eBay. These executives retaliated by sending parcels such as bloody pig masks, live spiders, cockroaches, books on surviving the death of a spouse, funeral flowers, and pornographic magazines to their home. They even went as far as creating fake social media accounts threatening the couple and posting fake events that are supposedly happening at the couple’s home.

The defendants have all plead guilty to the crime and are among six former senior employees charged. Court documents have shown they even have the conspiracy to tamper with witnesses and commit more cyber-stalking.

Filed Under: Uncategorized Tagged With:

Week 4 Presentation

September 22, 2020 by Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-4 (1)

Filed Under: Week 04: Network Mapping and Vulnerability Scanning Tagged With:

Reconnaissance Presentation

September 21, 2020 by Kyuande Johnson Leave a Comment

McKean Defense(Recon Prese)

Filed Under: Week 03: Reconnaisance Tagged With:

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 7
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Interim pages omitted …
  • Page 13
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in