Jack:
- Consent forms (scanning)
- Default Vulnerability Exploit consent form
- Data encryption (open source & closed source) (securing the data) (truecrypt)
- Email encryption (encrypting plain-text emails) (encrypting attached files) (complete encryption)
- Preparing for the attacks (armitage introduction) (armitage network scan) (armitage attack scan)
- Exploit 1 - Permissions form
- Exploit 1 - sort_mode information disclosure
- Exploit 1 - mitigation
- Exploit 2 - Permissions form
- Exploit 2 - Tomcat webserver
- Exploit 2 - mitigation
- Exploit 3 - Permissions form
- Exploit 3 - SQL injection on wordpress
- Exploit 3 - Mitigation
- Exploit 4 - Permissions form
- Exploit 4 - VMC Server Password
- Exploit 4 - Mitigation
- Exploit 9 - Theoretical physical access exploit
- Armitage (armitage introduction) (armitage network scan) (armitage attack scan)
- System machine stats
Priten:
- Setting up the pi (setting up the backdoor) (operating system used) (walkthrough) (encrypting the pi)
- Exploit 5 - Permissions form
- Exploit 5 - FTP
- Exploit mitigation
- Exploit 6 - Permissions form
- Exploit 6 - Windows Server SMB
- Exploit mitigation
- Exploit 7 - Permissions form
- Exploit 7 - Corpserver
- Exploit mitigation
- Exploit 8 - Permissions form
- Exploit 8 - Unreal Internet Relay Chat
- Exploit mitigation
- NMAP tutorial
Kirran:
- Legal
- Ethics
Abdul:
- Research on various port scanners (NMAP) (OPENVAS) (Nessus) (Core impact) (Nexpose) (Metasploit) (Comparisons)
Hisham:
- Introduction
Harry:
none due to no attendance for the duration of the second project
No comments:
Post a Comment
Note: only a member of this blog may post a comment.