Sökning: "port scan"

Visar resultat 1 - 5 av 8 uppsatser innehållade orden port scan.

  1. 1. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Afruz Bakhshiyeva; Gabriel Berefelt; [2022]
    Nyckelord :Connected vehicle; hacking; pentest; eavesdropping; security; Tesla Model 3; Volvo XC40; MG Marvel R; automotive cybersecurity; interception attacks; passive attacks; wireless attacks; Wi-Fi attacks; attack surface; relay attack; port scan; man-in-the-middle attack; Uppkopplade fordon; hacking; avlyssning; säkerhet; Tesla Model 3; Volvo XC40; MG Marvel R; fordonscybersäkerhet; avlyssningsattacker; passiva attacker; trådlösa attacker; Wi-Fi-attacker; attackyta; relä-attack; port-skanning; mannen-i-mitten attack;

    Sammanfattning : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. LÄS MER

  2. 2. Active- integrated aperture lens antenna

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Jesus Ventas Muñoz de Lucas; [2021]
    Nyckelord :;

    Sammanfattning : Luneburg lens antennas are gaining popularity in new communication systems, as increasingly higher frequencies are being used. Broadband fully- metallic implementations of Luneburg lenses, such as Rinehart- Luneburg lenses, constitute simple, cheap and efficient beamformers. LÄS MER

  3. 3. Training LSTM RNN models for network flow data classification for attack intention recognition systems

    Magister-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :James Chilila Antoine; [2020]
    Nyckelord :;

    Sammanfattning : The classification of network attack data, and prediction of the next likely set of network traffic flows is of particular interest to the cyber security domain, as it forms the basis for the timely response to cyber attacks as they progress. This work presents an overview of the main Attack Intention Recognition (AIR) approaches and techniques proposed over the last few years and proceeds to propose a system for classifying and distinguishing different types of network attacks using LSTM-RNN models. LÄS MER

  4. 4. Constructing and Evaluating a Raspberry Pi Penetration Testing/Digital Forensics Reconnaissance Tool

    Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Marcus Lundgren; Johan Persson; [2020]
    Nyckelord :Scapy; Python 3; Aircrack-ng; Reconnaissance Tool; Penetration testing; Wi-Fi Cracking; Password Cracking; Raspberry Pi;

    Sammanfattning : Tools that automate processes are always sough after across the entire IT field. This project's aim was to build and evaluate a semi-automated reconnaissance tool based on a Raspberry Pi 4, for use in penetration testing and/or digital forensics. LÄS MER

  5. 5. Reconfigurable Instrument Access Network with a Functional Port Interface

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Gani Kumisbek; Prathamesh Murali; [2019]
    Nyckelord :IEEE Std. 1687; IJTAG; UART.; Technology and Engineering;

    Sammanfattning : The ever-increasing need for higher performance and more complex functionality pushes the electronics industry to find a faster and more efficient way to test and debug an Integrated Circuit (IC). Currently, the IEEE Std. 1149.1, known as Joint Test Action Group (JTAG) is considered as state of the art by the industry. LÄS MER