Sökning: "Penetration Testing"

Visar resultat 6 - 10 av 161 uppsatser innehållade orden Penetration Testing.

  1. 6. Security evaluation of the Matrix Server-Server API

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Hîvron Stenhav; [2023]
    Nyckelord :Security; Ethical hacking; Open-Source; Matrix; Penetration testing; Threat modelling; API; Säkerhet; Etisk hackning; Öppen källkod; Matrix; Penetrationstesting; Hotmodellering; API;

    Sammanfattning : This thesis presents a comprehensive security analysis of the Server-Server API of the Matrix protocol, providing a detailed examination of its vulnerabilities and contributing a significant body of knowledge to the cybersecurity field. The research focused exclusively on the Server-Server API of the Matrix protocol. LÄS MER

  2. 7. Are Children Safe with Smart Watches? : Security Analysis and Ethical Hacking on Children’s Smart Watches

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Yaqi Tian; [2023]
    Nyckelord :Security analysis; Penetration testing; Smart watches; Mobile Applications; Säkerhetsanalys; Penetrationstestning; Smarta klockor; Mobilapplikationer;

    Sammanfattning : There are more and more parents that are considering to purchase smart watches for their kids. The children’s smart watches on the market are usually equipped with many practical functions like the GPS positioning, the camera and the messaging. LÄS MER

  3. 8. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Chunyu Zhuang; [2023]
    Nyckelord :Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Sammanfattning : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. LÄS MER

  4. 9. Penetration testing of Sesame Smart door lock

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Shuyuan Liu; [2023]
    Nyckelord :IoT; Smart door lock; State consistency; MITM attack; Replay attack; Reverse engineering; GPS spoofing; DoS attack; IoT; smart dörrlås; tillståndskonsistens; MITM-attack; Replay-attack; Reverse engineering; GPS-spoofing; DoS attack;

    Sammanfattning : The Internet of things (IoT) device has been widely used in various fields, and its market is expanding rapidly. However, the growing usage of IoT devices also brings more security concerns. The smart door lock is one of the smart home IoT devices that need to be designed securely. LÄS MER

  5. 10. Ethical Hacking of a Ring Doorbell

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Arnar Pétursson; [2023]
    Nyckelord :Security; Ethical hacking; Penetration testing; Internet of things; Threat modeling; Ring Doorbell.; Säkerhet; Etiskt hackande; Penetrationstestning; Sakernas internet; hotmodellering; Ring-dörrklockan.;

    Sammanfattning : Internet of Things (IoT) devices have entered the home, offices, and other parts of everyday life at an alarming rate in recent years. A large company in the IoT space is Ring. They mostly make smart home security devices, with the mission of making neighborhoods safer, and their flagship product is the Ring doorbell. LÄS MER