{"id":2520,"date":"2015-12-22T09:50:35","date_gmt":"2015-12-22T14:50:35","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5202online2016\/?page_id=2520"},"modified":"2015-12-22T09:50:35","modified_gmt":"2015-12-22T14:50:35","slug":"week-6","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/week-6\/","title":{"rendered":"Week 6: Ettercap \u2013 Build out test network in class for those available to come in"},"content":{"rendered":"<p><strong>Analysis Report<\/strong>: Learnings from Metasploit run against a publically available VM the student chooses<\/p>\n<p><strong>Readings:<\/strong><\/p>\n<p><a href=\"http:\/\/cdn.ttgtmedia.com\/rms\/pdf\/SearchSecurity.in_Burp_%20Suite_tutorial_Part_01.pdf\">http:\/\/cdn.ttgtmedia.com\/rms\/pdf\/SearchSecurity.in_Burp_%20Suite_tutorial_ Part_01.pdf\u00a0<\/a><\/p>\n<p><a href=\"http:\/\/cdn.ttgtmedia.com\/rms\/pdf\/SearchSecurity.in_Burp_%20Suite_tutorial_Part_01.pdf\">http:\/\/cdn.ttgtmedia.com\/rms\/pdf\/SearchSecurity.in_Burp_%20Suite_tutorial_ Part_02.pdf <\/a><\/p>\n<p><a href=\"http:\/\/cdn.ttgtmedia.com\/rms\/pdf\/SearchSecurity.in_Burp_%20Suite_tutorial_Part_03.pdf\">http:\/\/cdn.ttgtmedia.com\/rms\/pdf\/SearchSecurity.in_Burp_%20Suite_tutorial_ Part_03.pdf<\/a><\/p>\n<p>We will only use the functionality discussed in the first paper.<\/p>\n<p><a href=\"http:\/\/www.sans.org\/reading-room\/whitepapers\/application\/web-applicationinjection-vulnerabilities-web-app-039-s-security-nemesis-34247 7\">http:\/\/www.sans.org\/reading-room\/whitepapers\/application\/web-applicationinjection-vulnerabilities-web-app-039-s-security-nemesis-34247 7 <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Analysis Report: Learnings from Metasploit run against a publically available VM the student chooses Readings: http:\/\/cdn.ttgtmedia.com\/rms\/pdf\/SearchSecurity.in_Burp_%20Suite_tutorial_ Part_01.pdf\u00a0 http:\/\/cdn.ttgtmedia.com\/rms\/pdf\/SearchSecurity.in_Burp_%20Suite_tutorial_ Part_02.pdf http:\/\/cdn.ttgtmedia.com\/rms\/pdf\/SearchSecurity.in_Burp_%20Suite_tutorial_ Part_03.pdf We will only use the functionality discussed in the first paper. http:\/\/www.sans.org\/reading-room\/whitepapers\/application\/web-applicationinjection-vulnerabilities-web-app-039-s-security-nemesis-34247 7<\/p>\n","protected":false},"author":1207,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-2520","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/pages\/2520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/users\/1207"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/comments?post=2520"}],"version-history":[{"count":0,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/pages\/2520\/revisions"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/media?parent=2520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}