National Repository of Grey Literature 115 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Automatic tool for checking the level security of a web server
Kopecký, Samuel ; Martinásek, Zdeněk (referee) ; Smékal, David (advisor)
Nowadays it is common practice to have a securely hosted web server. To have a secure web server it is required to have the CIA (Confidentiality, Integrity, Availability) triad is in place. CIA triad is fulfilled by using mechanisms like symmetric cryptography and public key infrastructure. Protocol TLS (Transport layer security) enables the provision of the CIA triad and its function is described in the first part of this thesis along with the basics of cryptography. In the second part a tool written in the programming language Python is presented, which enables automation of security analysis of algorithms and parameters used by TLS. The tool is also capable of analyzing supported versions of the TLS protocol by a web server. Another feature of the tool is scanning a specific web server implementation. It can also analyze a few chosen vulnerabilities which are also described in the second part. At the end of the thesis the testing environment which was created to test the tool is described.
Implementation of a vulnerability assessment calculator
Ludes, Adam ; Švikruha, Patrik (referee) ; Martinásek, Zdeněk (advisor)
This bachelor thesis focuses on a newly introduced vulnerability scoring system, compares it to a most widespread alternative, which is Common Vulnerability Scoring System (CVSS), analyzes the Vue.js framework and other technologies used in the implementation. Lastly it introduces an implementation of said new scoring system in a way to best showcase its capabilities.
Applied Cryptography in IoT
Ilyushchenkov, Maxim ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
The bachelor thesis is devoted to security in IoT systems. The thesis describes the IoT architecture, how to ensure its security and various types of attacks on IoT devices. Subsequently, the protection of personal data IoT and solutions for its protection are described. The work also describes the MQTT technology, its principle of operation, architecture and basic elements. The practical part describes the implementation of the publisher and subscriber, who communicate using encrypted messages. Afterwards, the eciespy library is described, which enables encryption and decryption of messages. The method of communication between the server and the client using the TLS protocol and certificate exchange is also described. Finally, there is a solution for implementing secure communication between microcomputers using MQTT.
Implementation of application that demonstrates mobile application vulnerabilities
Šrůtková, Karolína ; Šilhavý, Pavel (referee) ; Martinásek, Zdeněk (advisor)
This master thesis is focused on an implementation of application for Android operating system that demonstrates mobile application vulnerabilities. Theoretical part contains security of mobile applications and its current state including a description of the biggest security risks and vulnerabilities. In addition, general development of mobile applications for Android is mentioned. In a practical part of the thesis a custom design of the application is described including vulnerabilities analysis, design of basic application blocks and selection of suitable tools for implementation. The section describing the implementation of the application describes the preparation of the environment, the structure of the created application and especially its implementation. The last part contains an example of implemented application vulnerabilities and also the result of its testing.
Web application for the detection system of risk situations at the railway crossing
Bachorec, Jan ; Malina, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
The thesis deals with the complete design, development and implementation of the server solution and graphical user interface for an autonomous system for detecting risk situations at a railway crossing. The server solution consists of a server service and a database. The .NET Core platform was used to develop the server service and its purpose is to perform the collection, processing and storage of information about risky traffic situations recorded by the camera modules. The service uses a Cassandra cluster database for secure data storage, and the database schema was designed with a focus on high performance. The own user interface is implemented with a web application built on Razor Pages technology. This application presents recorded traffic incidents to the user, using its own REST API service as a data source. REST API implements all logical operations on the data in the database.
Proposal and implementation of procedures for automated response of security incidents
Hons, Kamil ; Safonov, Yehor (referee) ; Martinásek, Zdeněk (advisor)
This diploma thesis deals with the development of proposals for procedures for dealing with security incidents, both from a theoretical and practical point of view. Three generic scenarios in the form of graphical diagrams, designed in Inkscape program, were created as a theoretical template for the automatic handling of security incidents. The first proposed scenario suggests a general procedure for dealing with an event in which an email attachment is marked as suspicious. The second scenario serves as a suggested procedure for handling an event, where an untrusted external IP address is suspected to be communicating with a local one. The third scenario then suggests an investigation procedure for events, where a suspicious file on a remote device needs to be investigated. Based on these created scenarios, a practical implementation of procedures for automized solving of security incidents was performed and documented in the Python programming language within the Splunk Phantom environment. As part of the documentation of the scenario implementation, two audiovisual demonstrations were created to illustrate the designed environment and the functionality of the implemented scenarios using programs such as OBS and Blender. The individual implementations are tested at the end of the thesis by running them automatically over events from a defined time range. The results are clearly analyzed in the form of tables to determine the success of these scenarios, which is based on checking how the analysis results differ from the original assumptions. Based on the analysis, the practical implementations of the scenarios have been modified to ensure that their output matches with the assumption. Thus, results are three proposed, tested and analyzed scenarios, which can further serve as a basis for specific implementations in a corporate information system. The actual implementation of the theoretical scenarios was carried out within a testing environment and the work includes a description of the communication and a setup of the environment. Finally, the results of the individual scenarios were described.
Intrusion prevention system based on Raspberry Pi
Hirš, David ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
The number of discovered vulnerabilities rapidly increases. For example in 2019 there were discovered 20 362 vulnerabilities. The probability of cyber-attacks realization is high. Therefore it is necessary to propose and implement automated and low-cost Intrusion Prevention or Intrusion Detection Systems (IPS/IDS). This implemetation can focus on home use or small corporate networks. The main goal of the system is to detect or mitigate cyber-attack impact as fast as possible. The master's thesis proposes IPS/IDS based on Raspberry Pi that can detect and prevent various cyber-attacks. Contents of this thesis are focus on description of cyber-attacks based on ISO/OSI model's Link and Network layers. Then there is description of IPS/IDS systems and theirs open source representatives. The practical part is focus on experimental workspace, hardware consumption of choosen detection systems, cyber-attacks scenarios and own implementation of detection program. Detection program is based on these chosen systems and puts them together to be easily manageable.
Modules for Manual Penetration Testing of a Web Application
Heriban, Radoslav ; Martinásek, Zdeněk (referee) ; Šeda, Pavel (advisor)
The main goal of this master's thesis was development of Burp Suite extension capable of interacting with various other automated tools, accompanied with development of a web application. Chapter two contains analysis of tools commonly used in penetration testing that could benefit from the ability to share Burp Suites data or functionality. The programming languages used were Java and JavaScript. The extension acts as a gateway to inner functionality of Burp Suite. It enables exfiltration of in memory objects such as sitemap, proxy history or found issues in JSON format to other tools, and also listens for incoming data that can be inserted into it's existing modules such as Repeater, Scanner, Spider or Comparer. Frontend application was written using JavaScript library React. The web application offers a graphical visualization of issue data.
Application that supports penetration tests of web applications
Holovová, Simona ; Švikruha, Patrik (referee) ; Martinásek, Zdeněk (advisor)
This master´s thesis is about the security of web applications and penetration testing. The main goal is to gain knowledge about testing methodologies OWASP Testing Guide and ASVS and to implement this knowledge into a web application to assist during manual penetration testing. The theoretical part of the thesis describes both methodologies and web technologies used during the development of the application. The practical part of the thesis is about the design of the application based on the specification, its implementation, and security hardening.

National Repository of Grey Literature : 115 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.