• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Week 1: Course Introduction
      • Week 2: Meterpreter, Avoiding Detection, Client Side Attacks, and Auxiliary Modules
      • Week 3: Social Engineering Toolkit, SQL Injection, Karmetasploit, Building Modules in Metasploit, and Creating Exploits
      • Week 4: Porting Exploits, Scripting, and Simulating Penetration Testing
      • Week 5: Independent Study – Perform Metasploit Attack and Create Presentation
      • Week 6: Ettercap
      • Week 7: Introduction to OWASP’s WebGoat application
    • Second Half of the Semester
      • Week 8: Independent Study
      • Week 9: Introduction to Wireless Security
      • Week 10: Wireless Recon, WEP, and WPA2
      • Week 11: WPA2 Enterprise, Wireless beyond WiFi
      • Week 12: Jack the Ripper, Cain and Able, Delivery of Sample Operating Systems
      • Week 13: Independent Study – Analyze provided Operating System Samples and Create Assessment Report
      • Week 14: Deliver Assessment to Operating System Class either in person or via teleconferenc
  • Assignments
    • Analysis Reports
    • Group Project Report and Presentation
  • Webex
  • Harvard Coursepack
  • Gradebook

MIS 5212-Advanced Penetration Testing

MIS 5212 - Section 001 - Wade Mackey

Fox School of Business

Donald Hoxhaj

BSF website down, malware sending fake e-mails detected

April 11, 2018 by Donald Hoxhaj Leave a Comment

 

https://timesofindia.indiatimes.com/india/bsf-website-down-malware-sending-fake-e-mails-detected/articleshow/63662381.cms

The website bsf.gov.in is not active and it has been under security audit from a month now, a BSF spokesperson told to the national news. It is discovered that the official website was hosting some malware infected files which are capable of sending fake emails claiming to be from Mumbai’s United Services Club. But the other official websites are functionally normal the other day. The Border Security Force is the primary border guarding force of India. It is one of the five Central Armed Police Forces of the Union of India.

This issue became public after MalwareHunterTeam, a team of security professionals tweeted about it after diagnosing the infected malware files on Friday. This is not the first time this group actively served but also when WannaCry Ransom ware hit the world previous year. Bryan Cambell, a UK-based security researcher also stated that the site bsf.gov.in had “numerous malware” and “multiple vulnerabilities.” Although the site is down for a while, it is available from the Google Cache results on Saturday.

Pentagon confirms hack attempt against Defense Department credit card holders

April 11, 2018 by Donald Hoxhaj Leave a Comment

 

https://www.cnbc.com/2018/03/15/pentagon-confirms-hack-attempt-against-defense-department-credit-card-holders.html

There is a confirmation from Pentagon that there was a hacking attempt against an online financial services portal of Defense Department which is managed by Citigroup. Citi provides consumers, corporations, governments and institutions with broad range of financial products and services, including consumer banking and credit, corporate and investment banking, securities brokerage, transaction services and wealth management.

The hack was made to access several Citi credit card accounts of the Department of Defense and it also stated that there was a large no. of attempts that almost crossed 1 Million attempts. The confirmation came after a day when Citigroup told to a news channel that a “malicious actor” attempted to gain access to information for Pentagon-linked credit card accounts. The bank also responded to the channel’s company saying that the attack came from a computer that was randomly guessing cardholder account credentials and also the bank told that “No data compromise occurred”.

Gamers make best cyber security experts, McAfee survey says

April 3, 2018 by Donald Hoxhaj Leave a Comment

 

http://www.straitstimes.com/tech/gamers-make-best-cyber-security-experts-survey-says

McAfee reports resulted in saying that, Gamers can be the best candidates for cyber security jobs. The survey involving 300 senior security managers and 650 security professionals, a major percent of respondents stated that, gamers could be a have a potential and skills for cyber security jobs, as they have an impulse to look at things differently, problem solving, logical thinking and active usage of brain.

Another major part of the respondents from the survey, believed that this particular generation, which has a large community of gamers and the young people who starts playing the video games at very young age will help the cyber security industry. As the cyber world is drastically increasing, we have to train more no. of cyber security professionals which might maintain a balance between the one and the bad when it comes to cyber security.

“Human and machines should work together to achieve better results, with the automated programs dealing with small and basic problems, allowing the human to deal with complex problems”, said Grant Bourzikas , Chief information security officer, McAfee.

TechVets will Teach Military Veterans to Learn Cybersecurity and Build National Security

April 3, 2018 by Donald Hoxhaj Leave a Comment

 

https://www.forbes.com/sites/montymunford/2018/04/07/techvets-will-teach-military-veterans-to-learn-cybersecurity-and-build-national-security/#41de46437f88

Military Veteran aren’t the one who live a happy life. The situation of veterans in UK is a bit strange, it is known that the sacrifices of military veterans are overlooked. But finally there is a good news, they are about to learn skillsets of technology and awareness on cyber security. This could help them in working in technology and cybersecurity sectors after their period of service.

A new non-profit social enterprise TechVets was recently launched in UK which was initiated by Mike Butcher along with his other co-founders Peter Connolly, a retired Major and entrepreneur, Mark Milton, a tech design and innovation specialist and Euan Crawford, a corporate financier. TechVets is going to work in ground with the UK government, to help build a tech and cyber sector with human potential.

Veterans possess unrivalled leadership, crisis management and problem-solving skills that have been forged in the toughest environments. When given effective transition support, veterans have the potential to contribute an enormous amount to the future of the UK’s tech, cybersecurity and startup sectors, said Mike Butcher, Co-Founder, TechVets.

Cyber threat to government websites

April 3, 2018 by Donald Hoxhaj Leave a Comment

 

https://economictimes.indiatimes.com/tech/internet/cyber-threat-to-government-websites-a-look-at-the-data/articleshow/63659529.cms

Cyber threat is not an exception to government sites. Recently this Friday, there was an unexpected shutdown of 10 various government websites which has provoked the officials that it might be a cyber-attack but later they got to relieve their nerves as it turned out to be a storage system failure that was a fearful coincidence, isn’t it?

There were some cyber activities which had taken place in the recent past. January 1, 2017, a group of unknown hackers partially defaced Nuclear Suppliers Group’s website. Between Nov, 2016 and June 2017, it is reported that there were 50 cyber-attacks on 19 financial organizations. From 2014, Out of 8000 hosted government websites on NICNET, 248 were defaced till Nov 2017. And the list is increasing rapidly with the increase of exploiters in the cyber world.

Government has taken some steps to prevent cyber-attacks and secure websites, The National Cyber Coordination Centre made some necessary situational awareness of existing and potential cyber threats. CERT-In has exercised 25 cyber securities in organizations in defense, IT, Energy, Power, telecom sectors to check for vulnerabilities.

City: Cyber-attack against Baltimore’s 911 computer-aided dispatch system was ransomware

March 21, 2018 by Donald Hoxhaj Leave a Comment

https://technical.ly/baltimore/2018/03/29/city-cyber-attack-baltimores-911-computer-aided-dispatch-system-ransomware/

The cyber-attack on Computer Aided Dispatch (CAD) system which supports Baltimore 911 operations, reported being ransomware. This cyber-attack was caused by ransomware perpetrators. Federal investigations are going on to know the source of the attack. The attack forced CAD system to go offline for 17 hours. This attack is placed in the category of Wannacry attack. Ransomware is not about stealing data, it only makes system non-functional. Whereas cyber-attacks involve stealing money as well as information. The attack in Baltimore city comes in line with the attack on Atlanta in which several official departments went offline. Employees are not able to use email any longer.

Soon the system was restored to the original level and computer affected with ransomware was segregated to prevent the transmission of attack to other parts of the network. No data was compromised in this attack. The city is concerned about these threats and has the strategic policy in place according to some officials. Every technical thing is at risk of cyber-attack. Every entity- whether public or private- is prone to this kind of attacks. An investigation is going on this matter but culprits are not yet known.

Acronis Warns About the Worst Year for Data Loss Incidents and Cyberattacks, Urges Immediate Action to Prepare

March 21, 2018 by Donald Hoxhaj Leave a Comment

https://www.prnewswire.com/news-releases/acronis-warns-about-the-worst-year-for-data-loss-incidents-and-cyberattacks-urges-immediate-action-to-prepare-300622152.html

According to Acronis, the year 2018 will be the worst year as far as cyber-attacks are concerned. According to a survey done by Acronis 60% of respondents never heard of ransomware. Ransom attacking will be increased to the rate of every 14 seconds in two years from the rate of 40 seconds this year. In this prediction, attack on individuals, which are more frequent, are not considered. Acronis warns that only a high-quality backup security solution will be able to prevent entities from ransomware.

Ponemon Institute revealed in a report that 69% of organizations do not believe their anti-virus can prevent ransomware activities in their organizations.  The new trend has emerged whereby the hacker attack backup files and data. Only a few backup solutions are able to protect from large-scale ransomware attacks. Due to growing ransomware attacks, Acronis improved its back up the solution by integrating it with innovative Ai based technology.  It also introduced Acronis Ransomware Protection which can be clubbed with other backup solutions.  Acronis advice to keep operating system and software up to date, always have the backup of important data and install anti-virus software.

Is counter-attack justified against a state-sponsored cyber attack? It’s a legal grey area

March 21, 2018 by Donald Hoxhaj Leave a Comment

https://theconversation.com/is-counter-attack-justified-against-a-state-sponsored-cyber-attack-its-a-legal-grey-area-94023

US Department of Justice indicted 9 Iranians against cyber-attacks on many public and private institutions, on March 23. Institutions were targeted worldwide; even United Nations was not spared. This movement will not reduce the number of cyber-attacks in future. International law does not provide provision for self-defense against cyber-attack (only army attack is identified). So it needs to be analyzed if this action by the US is appropriate and real. This is the grey area which international community should consider upon.

Defendants are founders of an organization formed for the purpose of scientific espionage. The organization is named as Mabna which reportedly got the contract from Iran to conduct cyberattack on its behalf. Lots of data were stolen by this organization. It wanted to steal research data and intellectual property information. More than 1 lakh professors and 8000 emails were targeted. Private companies were targeted too using password spraying technique in which hacker gains access to the email account by using default or common passwords. Some say that this action is not going to cause much deterrence. According to them, there should be counter attack as in this case culprits will not be given punishment as they are based in Iran.

Bank Negara foils attempted cyber attack

March 21, 2018 by Donald Hoxhaj Leave a Comment

https://www.businesstimes.com.sg/government-economy/bank-negara-foils-attempted-cyber-attack

Malaysia’s central bank revealed that it has foiled major cyber-attack in which false messages were sent through the SWIFT. Fortunately, no transactions were made and nothing wrong happened. But it is the second cyber-attack on central bank worldwide. First one occurred in 2016 on Bangladesh Central Bank in which $ 81 billion was spent. Both incidents involve SWIFT transaction method. Who was behind the attack is still unknown. Even how they access the bank’s SWIFT server is not known currently but it has triggered the wave of enhancing security by the financial institution. All the financial institutions, similarly. Got concerned after Bangladesh central bank attack.

Bank Negara supervises 45 commercial banks but it has not revealed the details of a message which were done by hackers.  SWIFT also declined to comment on the matter but said its security system was definitely compromised.it shows that SWIFT platform is vulnerable to this kind of attacks. Some hackers reportedly stole 339.5 million rubles from Russian bank using SWIFT transaction method. There was no disturbance to other functions of the Malaysian Bank according to Bank authorities. The bank is conducting the investigation in collaboration with many local and international agencies.

Major Siri bug exposes all your hidden messages even if your phone is locked

March 17, 2018 by Donald Hoxhaj Leave a Comment

https://mashable.com/2018/03/21/siri-iphone-lock-screen-bug-exposes-messages/

IOS’ new feature which claimed to protect data is not safe. A serious Siri bug can easily penetrate into data even if the phone is locked. It need not unlock the phone, it will straightaway get into your hidden messages. This new bug is discovered by Mac magazine which reveals that you can easily ask Siri to retrieve information from a locked phone. Only apple’ messages are not affected. Rest all the messages by third-party apps have been prone to Siri.

Apple said it was aware of the issue and working to fix the bug. It said new software update will not have such breach.  But the timeline for a new update has not been provided. Till the time new software comes, all the users are prone to data-stealing by Siri. All they can do is to disable the lock screen or disable the Siri when the phone is locked. Every company is vulnerable to data breaches. Till the time software comes, there will be risk regarding putting the information on the phone due to this vulnerability. Hopefully, users will be lucky.

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (10)
  • Week 01 (18)
  • Week 02 (9)
  • Week 03 (13)
  • Week 04 (17)
  • Week 05 (12)
  • Week 06 (16)
  • Week 07 (2)
  • Week 08 (8)
  • Week 09 (5)
  • Week 10 (10)
  • Week 11 (5)
  • Week 12 (5)
  • Week 13 (2)
  • Week 14 (7)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in