• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Week 1: Course Introduction
      • Week 2: Meterpreter, Avoiding Detection, Client Side Attacks, and Auxiliary Modules
      • Week 3: Social Engineering Toolkit, SQL Injection, Karmetasploit, Building Modules in Metasploit, and Creating Exploits
      • Week 4: Porting Exploits, Scripting, and Simulating Penetration Testing
      • Week 5: Independent Study – Perform Metasploit Attack and Create Presentation
      • Week 6: Ettercap
      • Week 7: Introduction to OWASP’s WebGoat application
    • Second Half of the Semester
      • Week 8: Independent Study
      • Week 9: Introduction to Wireless Security
      • Week 10: Wireless Recon, WEP, and WPA2
      • Week 11: WPA2 Enterprise, Wireless beyond WiFi
      • Week 12: Jack the Ripper, Cain and Able, Delivery of Sample Operating Systems
      • Week 13: Independent Study – Analyze provided Operating System Samples and Create Assessment Report
      • Week 14: Deliver Assessment to Operating System Class either in person or via teleconferenc
  • Assignments
    • Analysis Reports
    • Group Project Report and Presentation
  • Webex
  • Harvard Coursepack
  • Gradebook

MIS 5212-Advanced Penetration Testing

MIS 5212 - Section 001 - Wade Mackey

Fox School of Business

Kevin Blankenship

Britain Launches Cyber Attack Against ISIL Terrorists

April 13, 2018 by Kevin Blankenship Leave a Comment

https://www.silicon.co.uk/e-regulation/governance/britain-terrorists-cyber-attack-231337

For whatever reason the link does not work and keep redirecting the article. Just paste this in and remove the question mark: https://www.silicon.co.uk/e-regulation/gover?nance/britain-terrorists-cyber-attack-231337

The British intelligence agency GCHQ recently admitted they have been conducting cyber attacks against ISIL/ISIS. Most of the efforts to disrupt co-ordination and propaganda. The director of GCHQ said some of this work included destruction of networks and equipment, however he did not go into details as it was “too sensitive to talk about”.

This method of attack is another element in the growing importance of cyber security when it comes to national security, war, espionage, and retaliation.

Ransomware for robots is the next big security nightmare

March 12, 2018 by Kevin Blankenship 2 Comments

http://www.zdnet.com/article/ransomware-for-robots-is-the-next-big-security-nightmare/#ftag=RSSbaffb68

 

The article title is a bit sensationalist, however the story is amusing.

Researchers were able to create ransomware that infects humanoid robots produced by Softbank robotics. When infected, the robot ceased normal functionality and would proceed to taunt the audience and demand bitcoin as a random. While mainly a POC to demonstrate the risk and exposure present in robotics, the amusing demo should be taken as a warning. Like much of the IoTs, Robots will soon be connected online and handle varying levels of personal data. With a growing focus on the weakeness in internet connected devices, robotics should not be left out of the conversation.

Test Post: Introduction

February 9, 2018 by Kevin Blankenship Leave a Comment

Hello, figured I’d just do a quick intro as a test post this week.

I am Kevin Blankenship. I’m expecting to graduate the ITACS program this summer. Alongside this class I am taking Computer Forensics with Larry Brandolph. I currently work at QVC as an applications security engineer, focused on vulnerability management. My wife and I welcomed our first kid 1 month ago, so he is keeping us extremely busy. Looking forwards to a good semester with everyone!

Primary Sidebar

Weekly Discussions

  • Uncategorized (10)
  • Week 01 (18)
  • Week 02 (9)
  • Week 03 (13)
  • Week 04 (17)
  • Week 05 (12)
  • Week 06 (16)
  • Week 07 (2)
  • Week 08 (8)
  • Week 09 (5)
  • Week 10 (10)
  • Week 11 (5)
  • Week 12 (5)
  • Week 13 (2)
  • Week 14 (7)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in