Identify Possible Infection of Malware Into the Wireshark Capture File

INTRODUCTION

The main goal of laboratory report is to identify possible infection of malware into the wireshark capture file. The report should highlight the following aspects:

  • Download [not avaibale anymore]

  • Find malware download in this pcap and extract malware or malwares find out where malware was downloaded from.

  • What malware …

more ...


What is wireless network security?

Introduction

The first wireless telecommunications was established in early 20th century, within successful transmitted radio signal across Atlantic Ocean. And it was known as the first wireless communication across the ocean. However, in this time likewise the computers were not widespread, the inventors and developers of wireless have not had …

more ...




Clever solution by making site more resilient by optimization

PURPOSE & SCENARIO

The objective of this laboratory test, scenario is to make explore alternative “clever” solutions (as opposed to making the site more resilient by optimizing it) to protect your site against attacks. Moreover, DDoS [1] attacks, malicious code, etc.

Therefore, we need to develop countermeasures for the working attacks …

more ...

Testing SNORT – IDS rulesets

SCENARIO

The objective of this laboratory test, scenario is to create a solution and instructions for testing an IDS^1^ systems usefulness for detecting attacks against a wordpress site. In addition, we have to develop/download/find/whatever a SNORT configuration (rulesets, preprocessors, whatever) that performs better than the default …

more ...

Virtual Machine Malware / Malicious Analysis

INTRODUCTION

The main goal of laboratory report is to identify possible infection of two Windows 7 virtual machine. Virtual machines presented by the lecture:

  • Win 1
  • Win 2

The assignment is following:

  • Find out what is infecting the machine win1
  • Understand which way is the current malware dangerous to “your …
more ...

Security Programing Techniques

INTRODUCTION

The main goal of this post is to introduce the reader with the security programing techniques into deferent program languages and operating system security models. The post is introducing four following topics:

  1. Session storage’s in Ruby on Rail
  2. Parameterized statements into Java with JDBC, C# with ASP.NET …
more ...