• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Week 1: Course Introduction
      • Week 2: Meterpreter, Avoiding Detection, Client Side Attacks, and Auxiliary Modules
      • Week 3: Social Engineering Toolkit, SQL Injection, Karmetasploit, Building Modules in Metasploit, and Creating Exploits
      • Week 4: Porting Exploits, Scripting, and Simulating Penetration Testing
      • Week 5: Independent Study – Perform Metasploit Attack and Create Presentation
      • Week 6: Ettercap
      • Week 7: Introduction to OWASP’s WebGoat application
    • Second Half of the Semester
      • Week 8: Independent Study
      • Week 9: Introduction to Wireless Security
      • Week 10: Wireless Recon, WEP, and WPA2
      • Week 11: WPA2 Enterprise, Wireless beyond WiFi
      • Week 12: Jack the Ripper, Cain and Able, Delivery of Sample Operating Systems
      • Week 13: Independent Study – Analyze provided Operating System Samples and Create Assessment Report
      • Week 14: Deliver Assessment to Operating System Class either in person or via teleconferenc
  • Assignments
    • Analysis Reports
    • Group Project Report and Presentation
  • Webex
  • Harvard Coursepack
  • Gradebook

MIS 5212-Advanced Penetration Testing

MIS 5212 - Section 001 - Wade Mackey

Fox School of Business

Week 14

Windows 7 Analysis

April 26, 2017 by Noah J Berson Leave a Comment

Presentation

 

Analysis Summary from Noah Berson

OS Analysis and Report

April 26, 2017 by Scott Radaszkiewicz Leave a Comment

Executive Summary

Presentation

OS Analysis PPT and Executive Summary – Alkaysi

April 24, 2017 by Ahmed A. Alkaysi Leave a Comment

Hi, below is the ppt and executive summary for the OS analysis assignment.

PPT OS Analysis – Alkaysi

OS Analysis Executive Summary – Alkaysi

Online shoppers are losing trust in e-commerce, study finds

April 24, 2017 by Mauchel Barthelemy Leave a Comment

Global survey from the Center for International Governance Innovation reveals that almost half of all respondents say they don’t trust online shopping. This must be perceived positively from a cyber security standpoint. The general consumers starting to put more pressure on e-commerce organizations to implement superior security technologies to protect people’s privacy. Government regulators/agencies and IT companies must be transparent to explain what/how they will work together to do more for the common good of handling/protecting customers’ information.

http://www.techrepublic.com/article/online-shoppers-are-losing-trust-in-e-commerce-study-finds/

There’s now a tool to test for NSA spyware

April 24, 2017 by Shain R. Amzovski Leave a Comment

Article Link

“Luke Jennings of security firm Countercept wrote a script in response to last week’s high-profile leak of cyberweapons that some researchers believe are from the National Security Agency. It’s designed to detect an implant called Doublepulsar, which is delivered by many of the Windows-based exploits found in the leak and can be used to load other malware.”  This script is available for download on Github, but a user who downloads it will need some programming skills to allow it to run. “Jennings said he developed his script by analyzing how the Doublepulsar implant communicated over the internet to its control server. However, his original intention was to help businesses identify the implant over their networks, not to scan the entire internet for the implant.”

Meet PINLogger, the drive-by exploit that steals smartphone PINs

April 18, 2017 by Jason A Lindsley Leave a Comment

This article is about an attack devised by security researchers to access motion and orientation sensors using JavaScript code to server malicious code through HTML based iframe tags on legitimate sites.  The JavaScript can then accurately infer characters being entered into the devices by listening in through advert banners or open tabs.

The attacks that were demonstrated are most useful at guessing digits in four-digit PINs and have a 74-percent accuracy the first time it’s entered and a 94-percent chance of success by the third try.

The success of these attacks varied by browser.  Mozilla and iOS have released update to mitigate these attacks.  Google Chrome has not yet released a fix, but has acknowledged the issue publicly.

How Innovative Companies Lock Down Data

April 16, 2017 by Marcus A. Wilson Leave a Comment

How Innovative Companies Lock Down Data
http://www.darkreading.com/endpoint/how-innovative-companies-lock-down-data-/a/d-id/1328589?

This is an interesting article that discusses companies that are going “back to the basics” on security measures of protecting data while trying to incorporate the newest methods as well. The author discusses the old measures such as enforcing complex passwords, encryption standards, and disaster recovery readiness as the old but still important measures. He also mentions the new direction that companies are going in such as preventing attacking within applications, real-time monitoring, and using deep learning with cybersecurity analytics. A mixture of old reliable methods with new techniques are definitely needed to face the ever-changing security threats.

Thousands of Hacked Routers Used for WordPress Attacks

April 16, 2017 by Ahmed A. Alkaysi Leave a Comment

The company, WordFence, reported that tens of thousands of routers, associated with the state-owned telecom company Telecom Algeria, have been hacked and used to launch attacks on wordpress sites. The researchers from the firm also identified up to 27 ISPs from various countries to have their routers involved in this hacking. The vulnerability was the result of ISPs listening on port 7547, used to manage customer’s devices, were running a vulnerable web server, AllegroSoft RomPager. WordFence has reported to have seen more than 90k unique IP address from a total of 28 ISPs to have become compromised.

http://www.securityweek.com/thousands-hacked-routers-used-wordpress-attacks

How To Find Cybersecurity Vulnerabilities Across Your Environment

April 15, 2017 by Arkadiy Kantor Leave a Comment

How To Find Cybersecurity Vulnerabilities Across Your Environment

 

This article is written by a former CTO who talks about how he managed security at his data center. He talked about the “shotgun test” which is a test to see what you could destroy to do the most damage if you only had one bullet. He wanted to find something equivalent to test cybersecurity. He later suggests that’s Nessus vulnerability scanner might be the closest thing you can do to the shotgun test. He also emphasized the importance of having a balanced security portfolio and spend money wisely on diverse and appropriate security strategies.

 

https://www.forbes.com/sites/danwoods/2017/04/14/how-to-find-cybersecurity-vulnerabilities-across-your-environment/#14e753c4878a

Cerber Takes Ransomware Crown from Locky

April 13, 2017 by Jason A Lindsley Leave a Comment

This article is about the heavy distribution Cerber ransomeware and how it has taken over Locky in the last three months of the top ransomware threat.  Cerber is “ransomeware as a service” which allows novice users to pay for it to be used against targets.

The article emphasized that controls inside the perimeter are key to defending against malware such as Cerber because it is able to sneak past endpoint- and malware-detection technologies.  For example, least privilege access control is key to defending against this ransomeware because it crawls the network looking for accessible file systems and encrypting its contents.

This is an example of the importance of having a defense in depth approach to information security.

https://www.infosecurity-magazine.com/news/cerber-takes-ransomware-crown/

  • Page 1
  • Page 2
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (35)
  • Week 01 (2)
  • Week 02 (14)
  • Week 03 (13)
  • Week 04 (10)
  • Week 05 (7)
  • Week 06 (29)
  • Week 07 (8)
  • Week 08 (1)
  • Week 09 (6)
  • Week 10 (12)
  • Week 11 (7)
  • Week 12 (4)
  • Week 13 (6)
  • Week 14 (18)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in