• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Week 1: Course Introduction
      • Week 2: Meterpreter, Avoiding Detection, Client Side Attacks, and Auxiliary Modules
      • Week 3: Social Engineering Toolkit, SQL Injection, Karmetasploit, Building Modules in Metasploit, and Creating Exploits
      • Week 4: Porting Exploits, Scripting, and Simulating Penetration Testing
      • Week 5: Independent Study – Perform Metasploit Attack and Create Presentation
      • Week 6: Ettercap
      • Week 7: Introduction to OWASP’s WebGoat application
    • Second Half of the Semester
      • Week 8: Independent Study
      • Week 9: Introduction to Wireless Security
      • Week 10: Wireless Recon, WEP, and WPA2
      • Week 11: WPA2 Enterprise, Wireless beyond WiFi
      • Week 12: Jack the Ripper, Cain and Able, Delivery of Sample Operating Systems
      • Week 13: Independent Study – Analyze provided Operating System Samples and Create Assessment Report
      • Week 14: Deliver Assessment to Operating System Class either in person or via teleconferenc
  • Assignments
    • Analysis Reports
    • Group Project Report and Presentation
  • Webex
  • Harvard Coursepack
  • Gradebook

MIS 5212-Advanced Penetration Testing

MIS 5212 - Section 001 - Wade Mackey

Fox School of Business

Jimmy C. Jouthe

A Ransomware Variant from the CERBER Family has Emerged and it is Affecting Machine Learning

March 29, 2017 by Jimmy C. Jouthe Leave a Comment

A ransomware variant from the CERBER family has emerged and it is affecting machine learning file based detection solutions. With the emergence of machine learning solutions in the security industry, attackers are getting more crafty in how they evade systems. In this particular case attackers are taking advantage of static file detection solutions that focus on features instead of signatures.

Through their research Trend Micro has discovered that CERBER has the ability to evade a system undetected in a machine learning solution especially if it is static file based solution. As with all ransomware CERBER is distributed through email with a link to a self extracting archive file that is stored and maintained in DropBox by the attacker. The contents of the archive file is a Visual Basic script, a dll file and a configuration file. Once a user clicks on the link the archive file is downloaded and self extracts on to the target system. It then runs the VBscript file that is contained in the archive, loading the contained dll file during the process and decrypting part of the configuration file needed to evade the system. The issue presents itself in static detection tools that use machine learning because it is hard to detect CERBER when it looks like any other self extracting process involving an archived file. Even further once unpacked it may not be able to detect the binary contents and thus allow the non-malware to get in.
All the more reason why it is best to use more than one single approach to secure systems and the network they are in.  

Source:

Dark Reading

Trend Micro

 

Metasploit Assignment

February 21, 2017 by Jimmy C. Jouthe Leave a Comment

Metasploit Assignment Presentation Slides

Metasploit Assignment Executive Summary

InterContinental Confirms Credit Card Breach at 12 of It’s Hotels

February 4, 2017 by Jimmy C. Jouthe 1 Comment

A little over a month a go InterContinental reported that they were investigating “claims of a possible breach”. On Friday, February 3rd 2017,  it was confirmed that a malware was spotted in the servers and it was on a quest for track data, consisting of cardholder’s name, card number, expiration date and verification code, used between August and December of 2016. Intercontinental says that only the payment cards used at the restaurants and bars in 12 of it’s hotels were affected, the cards used at the front desk were not.

Source

Primary Sidebar

Weekly Discussions

  • Uncategorized (35)
  • Week 01 (2)
  • Week 02 (14)
  • Week 03 (13)
  • Week 04 (10)
  • Week 05 (7)
  • Week 06 (29)
  • Week 07 (8)
  • Week 08 (1)
  • Week 09 (6)
  • Week 10 (12)
  • Week 11 (7)
  • Week 12 (4)
  • Week 13 (6)
  • Week 14 (18)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in