• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Week 1: Course Introduction
      • Week 2: Meterpreter, Avoiding Detection, Client Side Attacks, and Auxiliary Modules
      • Week 3: Social Engineering Toolkit, SQL Injection, Karmetasploit, Building Modules in Metasploit, and Creating Exploits
      • Week 4: Porting Exploits, Scripting, and Simulating Penetration Testing
      • Week 5: Independent Study – Perform Metasploit Attack and Create Presentation
      • Week 6: Ettercap
      • Week 7: Introduction to OWASP’s WebGoat application
    • Second Half of the Semester
      • Week 8: Independent Study
      • Week 9: Introduction to Wireless Security
      • Week 10: Wireless Recon, WEP, and WPA2
      • Week 11: WPA2 Enterprise, Wireless beyond WiFi
      • Week 12: Jack the Ripper, Cain and Able, Delivery of Sample Operating Systems
      • Week 13: Independent Study – Analyze provided Operating System Samples and Create Assessment Report
      • Week 14: Deliver Assessment to Operating System Class either in person or via teleconferenc
  • Assignments
    • Analysis Reports
    • Group Project Report and Presentation
  • Webex
  • Harvard Coursepack
  • Gradebook

MIS 5212-Advanced Penetration Testing

MIS 5212 - Section 001 - Wade Mackey

Fox School of Business

Week 09

Online IT Security Courses – CISA, CISM, CISSP Certifications

May 4, 2018 by Younes Khantouri Leave a Comment

Believe it or not, but any computer connected to the Internet is vulnerable to cyber attacks.

With more money at risk and data breaches at a rise, more certified cybersecurity experts and professionals are needed by every corporate and organisation to prevent themselves from hackers and cyber thieves.

That’s why jobs in the cybersecurity field have gone up 80% over the past three years than any other IT-related job. So, this is the right time for you to consider a new career as a cybersecurity professional.

Cybersecurity experts with industry-standard certification are coming from a wide range of backgrounds, who prepare themselves to protect computer systems and networks from viruses and hackers.

https://thehackernews.com/2017/06/cyber-security-certification-training.html

Uber Agrees to New FTC Settlement Over 2016 Breach Disclosure

April 14, 2018 by Elizabeth V Calise Leave a Comment

Uber has agreed to an updated settlement with the Federal Trade Commission (FTC). The organization was charged last year for deceiving customers with its privacy and data security practices. The new settlement considers Uber’s massive 2016 data breach. In the original settlement, the FTC reported that Uber failed to live up to its claims that it closely monitored employees’ access to rider and driver data. Additionally, it failed to live up to that it implemented measures to secure personal data on the third-party cloud servers. After the original settlement, FTC learned that Uber failed to disclose a breach of user data. As a result, FTC updated its complaint to note that Uber knew about the breach and paid the attackers $100,000 through a “bug bounty program” to keep things quiet. In the new agreement, Uber is required to disclose future incidents involving consumer data and all reports from required third-party audits of its privacy program.

https://www.darkreading.com/attacks-breaches/uber-agrees-to-new-ftc-settlement-over-2016-breach-disclosure/d/d-id/1331525

“Finland’s 3rd Largest Data Breach Exposes 130,000 Users’ Plaintext Passwords”

April 12, 2018 by Shi Yu Dong 1 Comment

“Finland’s 3rd Largest Data Breach Exposes 130,000 Users’ Plaintext Passwords”

Finland’s citizens had their credentials compromised in a large data breach. Hackers attacked a new Business Center in Helsinki, a company that provides business consulting and planning and stole over 130,000 user’s credentials which were stored website database in plain-text without using any cryptographic hash.

Take-away: As part of their Incident Response plan, they reported the incidence to Helsinki Police authorities and publicly responded with their comments and steps taken towards investigating this data breach.

Ref. Link:
https://thehackernews.com/2018/04/helsingin-uusyrityskeskus-hack.html

Pentagon confirms hack attempt against Defense Department credit card holders

April 11, 2018 by Donald Hoxhaj Leave a Comment

 

https://www.cnbc.com/2018/03/15/pentagon-confirms-hack-attempt-against-defense-department-credit-card-holders.html

There is a confirmation from Pentagon that there was a hacking attempt against an online financial services portal of Defense Department which is managed by Citigroup. Citi provides consumers, corporations, governments and institutions with broad range of financial products and services, including consumer banking and credit, corporate and investment banking, securities brokerage, transaction services and wealth management.

The hack was made to access several Citi credit card accounts of the Department of Defense and it also stated that there was a large no. of attempts that almost crossed 1 Million attempts. The confirmation came after a day when Citigroup told to a news channel that a “malicious actor” attempted to gain access to information for Pentagon-linked credit card accounts. The bank also responded to the channel’s company saying that the attack came from a computer that was randomly guessing cardholder account credentials and also the bank told that “No data compromise occurred”.

Presentations for Week 9 and 10

March 23, 2018 by Wade Mackey 7 Comments

Advanced Penetration Testing -Week-9 Advanced Penetration Testing -Week-10

Primary Sidebar

Weekly Discussions

  • Uncategorized (10)
  • Week 01 (18)
  • Week 02 (9)
  • Week 03 (13)
  • Week 04 (17)
  • Week 05 (12)
  • Week 06 (16)
  • Week 07 (2)
  • Week 08 (8)
  • Week 09 (5)
  • Week 10 (10)
  • Week 11 (5)
  • Week 12 (5)
  • Week 13 (2)
  • Week 14 (7)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in