What is wireless network security?

Introduction

The first wireless telecommunications was established in early 20th century, within successful transmitted radio signal across Atlantic Ocean. And it was known as the first wireless communication across the ocean. However, in this time likewise the computers were not widespread, the inventors and developers of wireless have not had …

more ...




Clever solution by making site more resilient by optimization

PURPOSE & SCENARIO

The objective of this laboratory test, scenario is to make explore alternative “clever” solutions (as opposed to making the site more resilient by optimizing it) to protect your site against attacks. Moreover, DDoS [1] attacks, malicious code, etc.

Therefore, we need to develop countermeasures for the working attacks …

more ...

Testing SNORT – IDS rulesets

SCENARIO

The objective of this laboratory test, scenario is to create a solution and instructions for testing an IDS^1^ systems usefulness for detecting attacks against a wordpress site. In addition, we have to develop/download/find/whatever a SNORT configuration (rulesets, preprocessors, whatever) that performs better than the default …

more ...

Virtual Machine Malware / Malicious Analysis

INTRODUCTION

The main goal of laboratory report is to identify possible infection of two Windows 7 virtual machine. Virtual machines presented by the lecture:

  • Win 1
  • Win 2

The assignment is following:

  • Find out what is infecting the machine win1
  • Understand which way is the current malware dangerous to “your …
more ...

Security Programing Techniques

INTRODUCTION

The main goal of this post is to introduce the reader with the security programing techniques into deferent program languages and operating system security models. The post is introducing four following topics:

  1. Session storage’s in Ruby on Rail
  2. Parameterized statements into Java with JDBC, C# with ASP.NET …
more ...

Honeypot document

INTRODUCTION

The main goal of laboratory report is to identify possible leaked/stolen information, documents from our system without recognising that attacker had an access. Thus access of the document will inform us immediately with the information of the burglar. The report should highlight the following aspects:

  • Constructed an document …
more ...

Mobile Malware Analysis

PURPOSE

The goal of this post is to identify and analyze mobile malware file: mmc.jar. Thereby please follow the following steps for completing the task:

  • Unpack the file (hint – using zip on .jar)
  • Examine .class files using tool available here (local copies for Mac and Linux and Win
  • Find …
more ...