Essays about: "MITM attack"

Found 4 essays containing the words MITM attack.

  1. 1. Security Auditing and Testing of two Android Client-Server Applications

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Matilda Engström Ericsson; [2020]
    Keywords : Security audit; Security testing; Android Client-Server; OWASP Top 10 Mobile Risks; Automated tools; MITM attack; SSL; Authorization;

    Abstract : How secure is your application? How can you evaluate if it is secure? The threats are many and may be hard to find. In a world where things are more and more automated; how does manual labour contribute to security auditing applications? This study aims to assess two proof of concept Android client-server applications, developed by students to suit the needs of a fictitious Police Department and Fire Department, respectively. READ MORE

  2. 2. Data tampering in Vehicle CAN Bus networks

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Elpidoforos Arapantonis; [2019]
    Keywords : Keywords: Automotive Cyber Security; CAN bus vulnerabilities; Raspberry Pi; Arduino; Instrument Cluster;

    Abstract : The paradigm of the automotive industry has changed, over the course of the last10-15 years. Electronics and software, have introduced in many dierents parts ofa vehicle and the drive-by-wire it is taking over the vehicle functions. Connectivityfunctionalities are increasing in the context of the automotive industry as well. READ MORE

  3. 3. Ethical hacking of IoT devices: OBD-II dongles

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ludvig Christensen; Daniel Dannberg; [2019]
    Keywords : Hacking; OBD-II; Threat model; IoT security; AutoPi;

    Abstract : The subject area of this project is IT security related to cars, specifically the security of devices connected through a cars OBD-II connector. The aim of the project is to see the security level of the AutoPi OBD-II unit and to analyse where potential vulnerabilities are likely to occur when in use. READ MORE

  4. 4. Campus Network Design and Man-In-The-Middle Attack

    University essay from Högskolan i Halmstad/Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE); Högskolan i Halmstad/Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)

    Author : Mahmood Nazari; Kun Zhou; [2014]
    Keywords : SSL; Man-In-The-Middle; MITM; ARP Poisoning;

    Abstract : Security is at the front line of most networks, and most companies apply an exclusive security policy enclosing many of the Open Systems Interconnection (OSI) layers, from application layer all the way down to Internet Protocol (IP) security. On the other hand, an area that is often not protected with high level of security is the second layer of OSI model and this can compromise the entire network to a diversity of attacks. READ MORE