Sökning: "Penetration testing"

Visar resultat 1 - 5 av 64 uppsatser innehållade orden Penetration testing.

  1. 1. Tor och webbplatsorakel : Konstruktion och utvärdering av webbplatsorakel från DNS-tidtagning i Tor-nätverket.

    Kandidat-uppsats, Karlstads universitet

    Författare :Oscar Andersson; [2021]
    Nyckelord :Tor; The Tor Project; The Onion Router; Website Oracle; Attack; Penetration Testing; Network; Security; Side channel attack; DNS; Timing; Darknet; Dark net; Tor; Nätverksteknik; Attack; Webbplatsorakel; Sidokanalsattack; Penetrationstest; Datasäkerhet; Informationssäkerhet; DNS; The Tor Project; Darknet; Dark net;

    Sammanfattning : This paper discsusses the question: is website oracles in Tor from timing DNS something we have to worry about? This paper builds apon the findings done by Rasmus Dahlberg and Tobias Pulls in thier paper Website Fingerprinting with Website Oracles. A website oracle is a side channel attack that answers the predicate: has this website been visited before? The website oracle is constructed and test are carried out, with great outcome, resulting in that website oracles from timing DNS is not an attack that puts individuals using Tor at risk, but certanly challanges the idea of an anonymity network when such a lot of data can be derived from DNS. LÄS MER

  2. 2. Ethical hacking of Danalock V3 : A cyber security analysis of a consumer IoT device

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Rafi Aram Yadward Malkhasian; [2021]
    Nyckelord :;

    Sammanfattning : IoT-enheter blir alltmer populära. IoT-produkter tillåter användare att fjärrstyraenheten med hjälp av en mobilapplikation eller en webbapplikation. För dettaändamål används en mängd av kommunikationsprotokoll som Bluetooth och Wi-Fi.Denna sammankoppling av enheter och användningen av olika tekniker kan leda tillsäkerhetsproblem. LÄS MER

  3. 3. Adagio For The Internet Of Things : IoT penetration testing and security analysis of a smart plug

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Raman Salih; [2021]
    Nyckelord :;

    Sammanfattning : The emergence of the Internet of Things (IoT) shows us that more and more devices will be connected to the internet for all types of different purposes. One of those devices, the smart plug, have been rapidly deployed because of the ease it brings users into achieving home automation by turning their previous dumb devices smart by giving them the means of controlling the devices remotely. LÄS MER

  4. 4. Penetration testing of Android applications

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Robin Nilsson; [2020]
    Nyckelord :Ethical hacking; penetration testing; Android application security; reverse engineering; threat modeling; Etisk hacking; penetrationstest; Android-applikationssäkerhet; baklängeskonstruktion; hotmodellering;

    Sammanfattning : The market of Android applications is huge, and in 2019, Google Play users worldwide downloaded 84.3 billion mobile applications. With such a big user base, any security issues could have big negative impacts. LÄS MER

  5. 5. Web-based prototype for protecting controllers from existing cyber-attacks in an industrial control system

    Uppsats för yrkesexamina på grundnivå, KTH/Medicinteknik och hälsosystem

    Författare :Pa Sanyang; [2020]
    Nyckelord :ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS; ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS;

    Sammanfattning : Industrial control system or ICS is a critical part of the infrastructure in society. An example of ICS is the rail networks or energy plants like the nuclear plant. SCADA is an ICS system following a hierarchical structure. Due to the fact that a control system can be very large, monitoring remote through networks is an effective way to do so. LÄS MER