Friday 29 November 2013

Project 2, Session 7

Project 2, we have to essentially SSH into a Pi, scan the network and highlight all the vectors in which we can attack the network.

Group Leader - Priten
Compiling the report - Jack

Kirran [6]
Legal implications, Ethics & case studies  
To Be Proof-read By: Jack Hall - Not yet recieved

Tutorial on how to statically configure IP address on Kali Linux
Learn to use NMAPS, OpenVas & Nessus

Priten [2]
Setting up Pi as secure backdoor -
Setup Wifi Adapter
Learn to use NMAPS, OpenVas & Nessus

Abdul [3]
Research how to use the Nmap, OpenVas and Nessus & (3 others) Plus comparisons
Proof Read: Corrections confirmed, more information to be added

Learn to use NMAPS, OpenVas & Nessus

Jack [1]
Method of encrypting stored information  
Proof Read: Corrections Confirmed, COMPLETE

Tutorial on how to email encrypted messages for communication
Proof Read: Corrections Confirmed, COMPLETE

Creation of the consent forms
Learn to use NMAPS, OpenVas & Nessus

Harry [4]
Creation of the consent forms - Moved to Jack's responsibility due to lack of attendance
Learn to use NMAPS, OpenVas & Nessus
Did Not Attend

Hisham [5]
Assigned to write report introduction
Proof Read: Corrections to be confirmed
Learn to use NMAPS, OpenVas & Nessus
Did Not Attend

Wednesday 27 November 2013

Project 2, Session 6

Project 2, we have to essentially SSH into a Pi, scan the network and highlight all the vectors in which we can attack the network.

Group Leader - Priten
Compiling the report - Jack

Kirran [6]
Legal implications, Ethics & case studies  
To Be Proof-read By: Jack Hall - Not yet recieved

Tutorial on how to statically configure IP address on Kali Linux
Learn to use NMAPS, OpenVas & Nessus

Priten [2]
Setting up Pi as secure backdoor -
Setup Wifi Adapter
Learn to use NMAPS, OpenVas & Nessus

Abdul [3]
Research how to use the Nmap, OpenVas and Nessus & (3 others) Plus comparisons
Proof Read: Corrections to be confirmed 

Learn to use NMAPS, OpenVas & Nessus

Jack [1]
Method of encrypting stored information  
To Be Proof-read By: Priten Patel

Tutorial on how to email encrypted messages for communication
To be Proof-read By: Priten Patel
Learn to use NMAPS, OpenVas & Nessus

Harry [4]
Creation of the consent forms
Learn to use NMAPS, OpenVas & Nessus
Did Not Attend

Hisham [5]
Assigned to write report introduction
Proof Read: Corrections to be confirmed

Learn to use NMAPS, OpenVas & Nessus
Did Not Attend

Friday 22 November 2013

Project 2, Session 5

Project 2, we have to essentially SSH into a Pi, scan the network and highlight all the vectors in which we can attack the network.

Group Leader - Priten
Compiling the report - Jack

Kirran [6]
Legal implications, Ethics & case studies  
To Be Proof-read By: Jack Hall - Not yet recieved

Tutorial on how to statically configure IP address on Kali Linux
Learn to use NMAPS, OpenVas & Nessus

Priten [2]
Setting up Pi as secure backdoor -
Setup Wifi Adapter
Learn to use NMAPS, OpenVas & Nessus

Abdul [3]
Research how to use the Nmap, OpenVas and Nessus & (3 others) Plus comparisons
Learn to use NMAPS, OpenVas & Nessus
Did Not Attend

Jack [1]
Method of encrypting stored information  
To Be Proof-read By: Priten Patel

Tutorial on how to email encrypted messages for communication
Learn to use NMAPS, OpenVas & Nessus

Harry [4]
Creation of the consent forms
Learn to use NMAPS, OpenVas & Nessus
Did Not Attend

Hisham [5]
Assigned to write report introduction
Proof Read: Corrections to be confirmed

Learn to use NMAPS, OpenVas & Nessus
Did Not Attend

Friday 15 November 2013

Project 2, Session 3

Project 2, we have to essentially SSH into a Pi, scan the network and highlight all the vectors in which we can attack the network.

Group Leader - Priten
Compiling the report - Jack

Kirran [6]
Legal implications, Ethics & case studies To Be Proof-read By: Jack Hall
Tutorial on how to statically configure IP address on Kali Linux
Learn to use NMAPS, OpenVas & Nessus

Priten [2]
Setting up Pi as secure backdoor -
Setup Wifi Adapter
Learn to use NMAPS, OpenVas & Nessus

Abdul [3]
Research how to use the Nmap, OpenVas and Nessus & (3 others) Plus comparisons
Learn to use NMAPS, OpenVas & Nessus

Jack [1]
Method of encrypting stored information To Be Proof-read By: Priten Patel
Tutorial on how to email encrypted messages for communication
Learn to use NMAPS, OpenVas & Nessus

Harry [4]
Creation of the consent forms
Learn to use NMAPS, OpenVas & Nessus
Did Not Attend

Hisham [5]
Assigned to write report introduction To Be Proof-read By: Jack Hall
Learn to use NMAPS, OpenVas & Nessus



Wednesday 13 November 2013

Project 2, Session 2

Project 2, we have to essentially SSH into a Pi, scan the network and highlight all the vectors in which we can attack the network.

Group Leader - Priten
Compiling the report - Jack

Kirran [6]
Legal implications, Ethics & case studies

Priten [2]
Setting up Pi as secure backdoor

Abdul [3]
Research how to use the Nmap, OpenVas and Nessus & (3 others) Plus comparisons

Jack [1]
Method of encrypting stored information
Tutorial on how to email encrypted messages for communication
Tutorial on how to statically configure IP address on Kali Linux

Harry [4]
Creation of the consent forms

Hisham [5]
Did not attend
Assigned to write report introduction


Monday 11 November 2013

Project 2, Session 1

Project 2, we have to essentially SSH into a Pi, scan the network and highlight all the vectors in which we can attack the network.

Group Leader - Priten
Compiling the report - Jack

Kirran [6]
Legal implications, Ethics & case studies

Priten [2]
Setting up Pi as secure backdoor

Abdul [3]
Research how to use the Nmap, OpenVas and Nessus & (3 others) Plus comparisons

Jack [1]
Method of encrypting stored information
Tutorial on how to email encrypted messages for communication
Tutorial on how to statically configure IP address on Kali Linux

Harry [4]
Did not attend

Hisham [5]
Did not attend


Note: Be sure to reference all information that has been researched