• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Week 1: Course Introduction
      • Week 2: Meterpreter, Avoiding Detection, Client Side Attacks, and Auxiliary Modules
      • Week 3: Social Engineering Toolkit, SQL Injection, Karmetasploit, Building Modules in Metasploit, and Creating Exploits
      • Week 4: Porting Exploits, Scripting, and Simulating Penetration Testing
      • Week 5: Independent Study – Perform Metasploit Attack and Create Presentation
      • Week 6: Ettercap
      • Week 7: Introduction to OWASP’s WebGoat application
    • Second Half of the Semester
      • Week 8: Independent Study
      • Week 9: Introduction to Wireless Security
      • Week 10: Wireless Recon, WEP, and WPA2
      • Week 11: WPA2 Enterprise, Wireless beyond WiFi
      • Week 12: Jack the Ripper, Cain and Able, Delivery of Sample Operating Systems
      • Week 13: Independent Study – Analyze provided Operating System Samples and Create Assessment Report
      • Week 14: Deliver Assessment to Operating System Class either in person or via teleconferenc
  • Assignments
    • Analysis Reports
    • Group Project Report and Presentation
  • Webex
  • Harvard Coursepack
  • Gradebook

MIS 5212-Advanced Penetration Testing

MIS 5212 - Section 001 - Wade Mackey

Fox School of Business

Uncategorized

All Presentations

April 27, 2017 by Wade Mackey Leave a Comment

Advanced Penetration Testing -Week-1 Advanced Penetration Testing -Week-2 Advanced Penetration Testing -Week-3 Advanced Penetration Testing -Week-4 Advanced Penetration Testing -Week-6 Advanced Penetration Testing -Week-7 Advanced Penetration Testing -Week-9 Advanced Penetration Testing -Week-10 Advanced Penetration Testing -Week-11Advanced Penetration Testing -Week-12

OS Analysis PPT and Executive Summary – Alkaysi

April 24, 2017 by Ahmed A. Alkaysi Leave a Comment

Hi, below is the ppt and executive summary for the OS analysis assignment.

PPT OS Analysis – Alkaysi

OS Analysis Executive Summary – Alkaysi

Russia Spread Fake News And Disinformation In Sweden, Report Finds

April 24, 2017 by Mauchel Barthelemy Leave a Comment

Fake News has been a major topic during the 2017 post-American Presidential election season due of its potential roles in the voting outcomes. This is an area that Facebook, Google and other major technology companies decide to tackle because of the negative impact Fake News plagues to their reputations. Fake News emerges as a new form of manipulation to control elections, vehiculate propagandas, and so forth.

In the wake of combating Fake News, Russia seems to show signs as one of the government systems to take full advantage of Fake News. In the line of this idea, Huffington Post’s Willa Frej writes “Russia Spread Fake News And Disinformation In Sweden, Report Finds.” In the Article, the reporter elaborates that experts determined that a series of forged letters, Fake News items tactics have peppered the Swedish information landscape started three years ago, after the Russian annexation of Crimea from Ukraine.

You may access the full article via the link below.

http://www.huffingtonpost.com/entry/russia-sway-public-opinion-sweden_us_58753219e4b02b5f858b8f0d?utm_hp_ref=cyber-security

 

Snapchat denies CEO called India poor but hackers leak app’s data as payback

April 17, 2017 by Vaibhav Shukla Leave a Comment

Anonymous Indian hackers claim to have leaked database of 1.7 million Snapchat users, which they hacked last year. Indian hackers are among the top Bug Bounty hunters in the world working of IT giants finding bug in their system. Hackers said they had found the bug earlier but never used the data but ‘arrogance’ of the Snapchat CEO had miffed them.

The move by the hackers came in retaliation to Snapchat’s CEO Evan Spiegel’s remark on expanding the business to ‘poor countries’ like India. According to Indian hackers, they had found vulnerability in Snapchat database last year and had siphoned details of 1.7 million users. Hackers leaked and made this data based available on the darknet to mark their resentment against company’s remark for India. They have further threatened to carry out intensive strike against company on the virtual world till the CEO apologies for his remark.Indian users began uninstalling the app and downgrading its rating to a single star on the app store

http://www.dailymail.co.uk/indiahome/indianews/article-4417216/Snapchat-denies-CEO-called-India-poor-hackers-retaliate.html

http://www.thenewsminute.com/article/indian-hackers-retaliate-snapchat-ceo-s-india-remarks-leak-data-17-million-users-60475

Thousands of Hacked Routers Used for WordPress Attacks

April 16, 2017 by Ahmed A. Alkaysi Leave a Comment

The company, WordFence, reported that tens of thousands of routers, associated with the state-owned telecom company Telecom Algeria, have been hacked and used to launch attacks on wordpress sites. The researchers from the firm also identified up to 27 ISPs from various countries to have their routers involved in this hacking. The vulnerability was the result of ISPs listening on port 7547, used to manage customer’s devices, were running a vulnerable web server, AllegroSoft RomPager. WordFence has reported to have seen more than 90k unique IP address from a total of 28 ISPs to have become compromised.

http://www.securityweek.com/thousands-hacked-routers-used-wordpress-attacks

Cerber Takes Ransomware Crown from Locky

April 13, 2017 by Jason A Lindsley Leave a Comment

This article is about the heavy distribution Cerber ransomeware and how it has taken over Locky in the last three months of the top ransomware threat.  Cerber is “ransomeware as a service” which allows novice users to pay for it to be used against targets.

The article emphasized that controls inside the perimeter are key to defending against malware such as Cerber because it is able to sneak past endpoint- and malware-detection technologies.  For example, least privilege access control is key to defending against this ransomeware because it crawls the network looking for accessible file systems and encrypting its contents.

This is an example of the importance of having a defense in depth approach to information security.

https://www.infosecurity-magazine.com/news/cerber-takes-ransomware-crown/

Suspected CIA spying tools linked to hacks in 16 countries

April 10, 2017 by Brent Easley 1 Comment

http://www.pcworld.com/article/3188716/security/suspected-cia-spying-tools-linked-to-hacks-in-16-countries.html

CIA spying tools exposed by WikiLeaks have been linked to hacking attempts on at least 40 targets in 16 countries, according to Symantec.  Symantec is reporting that the tools are similar with the tactics from an espionage team named Longhorn.   Longhorn has been active since at least 2011, and they use Trojan programs and previously unknown software vulnerabilities to exploit targets.  Symantec stated that some of these targets are government and organizations in the financial, telecom, IT and aerospace sectors.  Some of the victim’s computers were in the Middle East, Europe, Asia, Africa and even in the US, where the CIA is not allowed to conduct electronic surveillance.

Cyberspies Target Middle East With Windows, Android Malware

April 9, 2017 by Ahmed A. Alkaysi 1 Comment

A cyber group has been targeting Middle Eastern organization using Windows and Android malware. The group, discovered by Chinese security firm and researchers from Palo Alto Networks, have been targeting educational and military organizations from Palestine to Egypt. The main method of delivering the malware was through fake news websites and phishing emails containing bit.ly shortened links. The malware enables hackers to steal passwords, take screenshots, and log keystrokes. The exact count of victims haven’t been determined, but researchers from Palo Alto have come to a conclusion that these attacks were mostly done by a group of attackers, instead of a lone wolf.

http://www.securityweek.com/cyberspies-target-middle-east-windows-android-malware

Cybercriminals Seized Control of Brazilian Bank for 5 Hours

April 5, 2017 by BIlaal Williams Leave a Comment

Cybercriminals for five hours one day took over the online operations of a major bank and intercepted all of its online banking, mobile, point-of-sale, ATM, and investment transactions in an attack that employed valid SSL digital certificates and Google Cloud to support the phony bank infrastructure. The attackers also obtained valid digital certificates for their poser bank’s servers via Let’s Encrypt, a legitimate HTTPS certificate provider, to dupe customers who, when they logged into their online accounts, were redirected to the phony systems.The bank didn’t deploy the two-factor authentication option offered by Registro.br, which left the financial institution vulnerable to an authentication-type attack as well as authentication-type flaws such as CSRF. This was a major bank heist, as this bank has $25 billion in assets, 5 million customers worldwide, and 500 branches in Brazil, Argentina, the US, and the Cayman Islands. According to the article many more banks are at risk; most banks in Latin America rely on a third-party DNS provider for their infrastructure, and at least half of the top 20 largest banks in the world use DNS providers for some or all of their DNS infrastructure.

Article

Why Are Health Records So Valuable to Cybercriminals?

April 5, 2017 by Vaibhav Shukla Leave a Comment

There has been this constant question in my mind about why healthcare records are so valuable to criminals and what would a criminal do by knowing the health history of some unknown persons.But here lies the answer to it.

Stealing EHRs is better for cybercriminals than stealing credit cards, which can be used only until the card expires, is maxed out or canceled.An EHR database containing PII that do not expire — such as Social Security numbers — can be used multiple times for malicious intent.Stolen EHR can be used to acquire prescription drugs, receive medical care, falsify insurance claims, file fraudulent tax returns, open credit accounts, obtain official government-issued documents such as passports [and] driver’s licenses, and even create new identities.”Another important statistic that helps explain why cybercriminals are attracted to EHR data is that 91 percent of the U.S. population has health insurance. It’s no wonder, then, that 113.2 million healthcare-related records were stolen in 2015

http://www.technewsworld.com/story/84417.html

  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (35)
  • Week 01 (2)
  • Week 02 (14)
  • Week 03 (13)
  • Week 04 (10)
  • Week 05 (7)
  • Week 06 (29)
  • Week 07 (8)
  • Week 08 (1)
  • Week 09 (6)
  • Week 10 (12)
  • Week 11 (7)
  • Week 12 (4)
  • Week 13 (6)
  • Week 14 (18)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in