Monday, 13 January 2014

Project 2, Final Attribution post


Jack:
  • Consent forms (scanning)
  • Default Vulnerability Exploit consent form
  • Data encryption (open source & closed source) (securing the data) (truecrypt)
  • Email encryption (encrypting plain-text emails) (encrypting attached files) (complete encryption)
  • Preparing for the attacks (armitage introduction) (armitage network scan) (armitage attack scan)
  • Exploit 1 - Permissions form
  • Exploit 1 - sort_mode information disclosure
  • Exploit 1 - mitigation
  • Exploit 2 - Permissions form
  • Exploit 2 - Tomcat webserver
  • Exploit 2 - mitigation
  • Exploit 3 - Permissions form
  • Exploit 3 - SQL injection on wordpress
  • Exploit 3 - Mitigation
  • Exploit 4 - Permissions form
  • Exploit 4 - VMC Server Password
  • Exploit 4 - Mitigation
  • Exploit 9 - Theoretical physical access exploit
  • Armitage (armitage introduction) (armitage network scan) (armitage attack scan)
  • System machine stats

Priten:
  • Setting up the pi (setting up the backdoor) (operating system used) (walkthrough) (encrypting the pi)
  • Exploit 5 - Permissions form
  • Exploit 5 - FTP
  • Exploit mitigation
  • Exploit 6 - Permissions form
  • Exploit 6 - Windows Server SMB
  • Exploit mitigation
  • Exploit 7 - Permissions form
  • Exploit 7 - Corpserver
  • Exploit mitigation 
  • Exploit 8 - Permissions form
  • Exploit 8 - Unreal Internet Relay Chat
  • Exploit mitigation 
  • NMAP tutorial

Kirran:
  • Legal
  • Ethics 
Abdul:
  • Research on various port scanners (NMAP) (OPENVAS) (Nessus) (Core impact) (Nexpose) (Metasploit) (Comparisons)

Hisham:
  • Introduction

Harry:
none due to no attendance for the duration of the second project

No comments:

Post a Comment

Note: only a member of this blog may post a comment.