• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Week 1: Course Introduction
      • Week 2: Meterpreter, Avoiding Detection, Client Side Attacks, and Auxiliary Modules
      • Week 3: Social Engineering Toolkit, SQL Injection, Karmetasploit, Building Modules in Metasploit, and Creating Exploits
      • Week 4: Porting Exploits, Scripting, and Simulating Penetration Testing
      • Week 5: Independent Study – Perform Metasploit Attack and Create Presentation
      • Week 6: Ettercap
      • Week 7: Introduction to OWASP’s WebGoat application
    • Second Half of the Semester
      • Week 8: Independent Study
      • Week 9: Introduction to Wireless Security
      • Week 10: Wireless Recon, WEP, and WPA2
      • Week 11: WPA2 Enterprise, Wireless beyond WiFi
      • Week 12: Jack the Ripper, Cain and Able, Delivery of Sample Operating Systems
      • Week 13: Independent Study – Analyze provided Operating System Samples and Create Assessment Report
      • Week 14: Deliver Assessment to Operating System Class either in person or via teleconferenc
  • Assignments
    • Analysis Reports
    • Group Project Report and Presentation
  • Webex
  • Harvard Coursepack
  • Gradebook

MIS 5212-Advanced Penetration Testing

MIS 5212 - Section 001 - Wade Mackey

Fox School of Business

Week 09

Week 9 Presentation

March 29, 2017 by Wade Mackey Leave a Comment

Advanced Penetration Testing -Week-9

Is Trump Still Tweeting From His Unsecured Android Phone?

March 28, 2017 by Shain R. Amzovski Leave a Comment

Article

Here is an interesting news article I found this week, titled “Is Trump Still Tweeting From His Unsecured Android Phone?” Apparently, President Trump was tweeting from a Samsung Galaxy S3 which he has been attached to and did not want to upgrade.  This version of Samsung’s Galaxy line was no longer receiving Android updates and was extremely susceptible to hacking.  The article stated, “The device, likely a Samsung Galaxy S3, has such serious security problems that it’s probably “compromised by at least one—probably multiple—hostile foreign intelligence services and is actively being exploited,” More recently, it appears Trump’s tweets have been coming from an iPhone.  His security team may have finally realized the security risk of his old Samsung device and forced the President to upgrade.

How to protect all your accounts online

March 25, 2017 by Mauchel Barthelemy Leave a Comment

The author of this article, David Nield, did a wonderful job explaining how users can take advantage of all security features from all major technology platforms. Google, Apple, Facebook, Microsoft, Twitter, you name it. One of the things that caught my attention is that all of them have one thing in common, two-step verification. I’m sure all of you are aware that two-factor verification is a simple method requiring more than username and a password to successfully log-into an online account.

One the other hand, it looks like not all companies implement similar policies, and sometimes employ distinct ways to protect consumers within their platforms. When I first read the title of the article, I had the impression the author was going to focus on one major way, probably from one central technology platform, to protect all my online accounts. That was not the case. Rather, David wrote about each company separately to explain all features available that consumers can utilize to protect themselves online. Give it a read as there might be certain feature(s) that could be unfamiliar and from which you could enhance your online safety.

http://www.popsci.com/protect-your-accounts-online

Payments Giant Verifone Investigating Breach

March 22, 2017 by Ioannis S. Haviaras 1 Comment

Verifone, a massive credit card point-of-sales machine manufacturer, has been breached. On Jan 23, 2017 an urgent email from Verifone’s CIO, Steve Horan required employees to change their password. Verifone supposedly was breached in mid-2016 and was just able to find out which systems were compromised. Fortunately the only systems that were compromised were internal networks in the corporate offices. No POS devices were compromised as of yet.

https://krebsonsecurity.com/2017/03/payments-giant-verifone-investigating-breach/

New Metasploit Extension Available for Testing IoT Device Security

March 21, 2017 by Mengqi He 1 Comment

New RF Transceiver extension for the Metasploit Hardware Bridge API now is available for organizations to detect and scan wireless IoT devices operating outside the standard 802.11 specification. The new extension further broadens the use cases for Metasploit. It is designed for enabling organizations to craft and monitor different RF packets for identifying and assessing the security state of multi-frequency wireless devices more effectively than current tools. It allows pen testers to create and direct “short bursts of interference” at such devices to see how they respond from a security standpoint. One of the greatest threats of wireless IoT devices is the unauthorized access to the information that those devices have access to. For example, a smart lighting system with both RF and WiFi components may be attacked on the RF side to get access to the WiFi side. In addition, many RF-enabled devices fail to serialize or otherwise make sure that each request and response is unique, and therefore are vulnerable to issues like replay attacks. Since organizations are expected to connect a constantly growing range of wireless IoT devices, it’s important to increase the RF testing capabilities.

Link: http://www.darkreading.com/threat-intelligence/new-metasploit-extension-available-for-testing-iot-device-security/d/d-id/1328452

 

 

Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password

March 21, 2017 by Loi Van Tran 1 Comment

This article is gear more towards internal threats. The article points out the local system admins can hijack privileged windows user session without passwords.  For instance, the CFO has his desktop/laptap containing sensitive financial data.  He went out for lunch and locked his computer, as required my company’s policy.  A local administrator could essentially remote in or if had access to the physical machine his own credential and hijack the CIOs session, giving him access to the sensitive data.

The article is pretty interesting and there is Demo video attached.

http://thehackernews.com/2017/03/hack-windows-user-account.html

Primary Sidebar

Weekly Discussions

  • Uncategorized (35)
  • Week 01 (2)
  • Week 02 (14)
  • Week 03 (13)
  • Week 04 (10)
  • Week 05 (7)
  • Week 06 (29)
  • Week 07 (8)
  • Week 08 (1)
  • Week 09 (6)
  • Week 10 (12)
  • Week 11 (7)
  • Week 12 (4)
  • Week 13 (6)
  • Week 14 (18)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in