Monday, 11 November 2013

Project 2, Session 1

Project 2, we have to essentially SSH into a Pi, scan the network and highlight all the vectors in which we can attack the network.

Group Leader - Priten
Compiling the report - Jack

Kirran [6]
Legal implications, Ethics & case studies

Priten [2]
Setting up Pi as secure backdoor

Abdul [3]
Research how to use the Nmap, OpenVas and Nessus & (3 others) Plus comparisons

Jack [1]
Method of encrypting stored information
Tutorial on how to email encrypted messages for communication
Tutorial on how to statically configure IP address on Kali Linux

Harry [4]
Did not attend

Hisham [5]
Did not attend


Note: Be sure to reference all information that has been researched

No comments:

Post a Comment

Note: only a member of this blog may post a comment.