Download presentation
Presentation is loading. Please wait.
1
MIS 5212.001 Week 7 Site: http://community.mis.temple.edu/mis5212sec001s15/ http://community.mis.temple.edu/mis5212sec001s15/
2
In the news Presentations (2) More Walk Through of WebGoat Next Week 2MIS 5212.001
3
Submitted http://arstechnica.com/security/2015/02/lenovo-pcs- ship-with-man-in-the-middle-adware-that-breaks-https- connections/ http://arstechnica.com/security/2015/02/lenovo-pcs- ship-with-man-in-the-middle-adware-that-breaks-https- connections/ http://www.darkreading.com/vulnerabilities--- threats/insider-threats/from-hacking-systems-to- hacking-people-/a/d-id/1319195 http://www.darkreading.com/vulnerabilities--- threats/insider-threats/from-hacking-systems-to- hacking-people-/a/d-id/1319195 http://solutions.3m.com/wps/portal/3M/en_US/3MSc reens_NA/Protectors/Industries/VisualHackingExperim ent/?WT.mc_id=www.3Mscreens.com/visualhacking http://solutions.3m.com/wps/portal/3M/en_US/3MSc reens_NA/Protectors/Industries/VisualHackingExperim ent/?WT.mc_id=www.3Mscreens.com/visualhacking http://news.sky.com/story/1432853/10000-drivers-in- parking-ticket-data-breach http://news.sky.com/story/1432853/10000-drivers-in- parking-ticket-data-breach http://thehackernews.com/2015/02/track-smartphone- location.html http://thehackernews.com/2015/02/track-smartphone- location.html MIS 5212.0013
4
Submitted http://www.securityweek.com/attackers-increase-use- powershell-wmi-evade-detection-mandiant http://www.securityweek.com/attackers-increase-use- powershell-wmi-evade-detection-mandiant http://thehackernews.com/2015/02/vulnerable- operating-system.html?m=1 http://thehackernews.com/2015/02/vulnerable- operating-system.html?m=1 http://threatpost.com/google-pwnium-program-now- open-all-year/111251 http://threatpost.com/google-pwnium-program-now- open-all-year/111251 http://www.darkreading.com/analytics/threat- intelligence/cybercrime-cyber-espionage-tactics- converge/d/d-id/1319203?print=yes http://www.darkreading.com/analytics/threat- intelligence/cybercrime-cyber-espionage-tactics- converge/d/d-id/1319203?print=yes http://redmondmag.com/blogs/the-schwartz- report/2015/02/lenovo-betrayed-customer-trust.aspx http://redmondmag.com/blogs/the-schwartz- report/2015/02/lenovo-betrayed-customer-trust.aspx MIS 5212.0014
5
What I noted http://krebsonsecurity.com/2015/02/turbotaxs-anti- fraud-efforts-under-scrutiny/ http://krebsonsecurity.com/2015/02/turbotaxs-anti- fraud-efforts-under-scrutiny/ http://www.itworld.com/article/2887795/nsa-director- wants-govt-access-to-encrypted-communications.html http://www.itworld.com/article/2887795/nsa-director- wants-govt-access-to-encrypted-communications.html http://www.theregister.co.uk/2015/02/24/anthem_data _breach_broadens/ http://www.theregister.co.uk/2015/02/24/anthem_data _breach_broadens/ http://www.theregister.co.uk/2015/02/24/redmond_bo ffins_build_exploit_kit_coffins/ http://www.theregister.co.uk/2015/02/24/redmond_bo ffins_build_exploit_kit_coffins/ http://www.theregister.co.uk/2015/02/24/samba_remo te_execution_vuln/ http://www.theregister.co.uk/2015/02/24/samba_remo te_execution_vuln/ http://www.theregister.co.uk/2015/02/23/hp_hack_vul nerable_threat_study/ (2-4 Yr Old Hacks) http://www.theregister.co.uk/2015/02/23/hp_hack_vul nerable_threat_study/ MIS 5212.0015
6
6
7
Access Control Flaws Stage 1 Stage 2 Authentication Flaws Cross-Site Scripting Phishing Stage 1 Stage 5 Reflected XSS Attacks Improper Error Handling Fail Open Authentication Scheme MIS 5212.0017
8
Injection Flaws: Command Injection: " & netstat -ant & ifconfig“ Numerical SQL Injection: or 1=1 Log Spoofing XPATH Injection String SQL Injection Modifying Data with SQL Injection Adding Data with SQL Injection Blind Numeric SQL Injection Blind String SQL Injection MIS 5212.0018
9
In the news More Walkthrough of WebGoat MIS 5212.0019
10
? 10
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.