Essays about: "thesis on hacking"

Showing result 1 - 5 of 48 essays containing the words thesis on hacking.

  1. 1. Security evaluation of the Matrix Server-Server API

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hîvron Stenhav; [2023]
    Keywords : Security; Ethical hacking; Open-Source; Matrix; Penetration testing; Threat modelling; API; Säkerhet; Etisk hackning; Öppen källkod; Matrix; Penetrationstesting; Hotmodellering; API;

    Abstract : This thesis presents a comprehensive security analysis of the Server-Server API of the Matrix protocol, providing a detailed examination of its vulnerabilities and contributing a significant body of knowledge to the cybersecurity field. The research focused exclusively on the Server-Server API of the Matrix protocol. READ MORE

  2. 2. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yang Wang; [2023]
    Keywords : Network Attribution. Cyber Range; Ethical Hacking Course. Graph Database.; Nätverksattribuering; Cyberområde; Etisk Hackningskurs; Grafisk Databas;

    Abstract : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. READ MORE

  3. 3. Pentesting on a WiFi Adapter : Afirmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Henning; [2023]
    Keywords : Firmware; Drivers; WiFi; Ethical Hacking; Penetration Testing.; Firmware; Drivrutiner; WiFi; Etisk Hackning; Penetration Testing.;

    Abstract : Simple IoT devices such as WiFi adapters have the possibility of containing vulnerabilities because of the vast complexity of parsing and implementing the IEEE 802.11 standard correctly. READ MORE

  4. 4. Underneath the Surface : Threat modeling and penetration testing of a submarine robot

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Niklas Vatn; [2023]
    Keywords : Security; Ethical Hacking; Threat Modeling; IoT; Autonomous Underwater Vehicles; Säkerhet; Etisk Hackning; Hotmodelling; IoT; Autonoma Undervattensrobotar;

    Abstract : Connected devices have become an integral part of life in modern society. In the industry, several tasks have been automatized and are now performed by robots, a development that is called Industry 4.0. READ MORE

  5. 5. Is your camera spying on you? : A security evaluation of a smart camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Pontus Karlberg; [2023]
    Keywords : IoT; Security; Hacking; IoT; Säkerhet; Dataintrång;

    Abstract : There are billions of Internet of Things (IoT) devices deployed world wide. Despite this there have been numerous studies showing that these devices very often have major security vulnerabilities. Ensuring the security of IoT devices is important, but especially so for devices that handle sensitive data. READ MORE