National Repository of Grey Literature 34 records found  1 - 10nextend  jump to record: Search took 0.02 seconds. 
Darkmarket Forensics
Dolejška, Daniel ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
Overlay networks (like Tor or I2P) create a suitable environment for criminality to thrive on the Internet. Dark marketplaces (a.k.a. cryptomarkets) are one such example of criminal activities. They act as an intermediary in the trade of illegal goods and services. This project focuses on forensic analysis of such web services and subsequent extraction of non-trivial information about the realised orders and payments from selected marketplaces. The main goal is to pinpoint the time interval when an order has been completed on selected marketplaces and its following correlation with cryptocurrency blockchains. The implemented program provides fully automated non-stop monitoring of selected cryptomarkets. That, under certain conditions, allows detection of realised purchases, detailed product and vendor monitoring and collection of various meta-data entries. Law enforcement agencies can use acquired data as support evidence regarding the operation of selected cryptomarkets and their vendors. The obtained information can also indicate current trends in products supply and demand.
Increasing effectivness of CDN network
Barzali, Mark ; Pluskal, Jan (referee) ; Grégr, Matěj (advisor)
Tato práce představuje koncept sítě pro doručování obsahu Content Delivery Network (CDN) a vymezuje současné problémy, kterým tyto sítě čelí. Následně je představena architektura CDN ve společnosti Seznam.cz. Studie zahrnuje získání výkonnostních metrik CDN Seznam.cz, konkrétně využití sítě a zaplňování mezipaměti, pro přehled o současném stavu CDN. Výsledky obsahují měření z proxy serverů v CDN Seznam.cz, která budou dále porovnávána s budoucími vylepšeními. Celkově výsledky odhalují aktuální stav CDN v existující architektuře a poskytují cenné poznatky pro potenciální optimalizace sítě. Dále jsou diskutovány přístupy, které by mohly pomoct zvýšit efektivitu vyrovnávací paměti ve firmě, detaily implementace a konečné výsledky
Implementation of a MitM probe on the platform RPi
Nekula, Štěpán ; Holop, Patrik (referee) ; Tamaškovič, Marek (advisor)
Cílem této práce je implementovat síťovou sondu pro monitorování šifrovaného síťového provozu. Navržená síťová sonda využívá útoku Man-in-the-Middle (MitM) pro zachycení a získání přístupu k šifrovaným datům. Základem sondy je platforma Raspberry Pi, na které běží software SSLproxy, jež zprostředkovává zachycování a dešifrování dat ze sítě. Tyto data jsou následně prohledávány pomocí detekčního systému hrozeb Suricata. Výkon sondy byl testován detekcí simulovaných útoků, jako je šíření nebezpečných souborů a síťové útoky. Tato práce poskytuje nástroj pro další výzkum v oblasti monitorování šifrovaných sítí a detekci hrozeb v šifrované komunikaci.
Design and Creation of Proxy for Penetration Testing
Válka, Michal ; Bláha, Lukáš (referee) ; Dydowicz, Petr (advisor)
This bachelor’s thesis is aimed at design and development of proxy for penetration testing. The thesis is divided into three main parts and begins with a theoretical part, which is focused on fundamental technologies and principles on which the application is based. The second part is focused on comparison of currently available solutions. The third part contains the creation of the proxy itself. The last chapter contains a summary of this thesis and the benefits of the developed product for penetration testing.
Configurable Security Email Proxy
Židek, Stanislav ; Samek, Jan (referee) ; Cvrček, Daniel (advisor)
This bachelor thesis deals with design and implementation of multiuser configurable system capable of securing communication via electronic mail. Emphasis is put especially on remote configuration. It also describes existing protocols used for this communication and some of the mechanisms that can secure this communication from different points of view.
Web Traffic Analysis and Reconstruction with NetMon
Weiss, Patrik ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
This thesis discusses design and implementation of tool for reconstruction of HTTP traffic based upon HTTP proxy with Microsoft Network Monitor application interface. This thesis also solves problems with reconstruction and analysis of HTTP data such as TCP fragmentation. Output of this thesis is an application for web traffic reconstruction.
Transfer of Security Email Proxy into Embedded Device
Richter, Jan ; Pecho, Peter (referee) ; Schäfer, Jiří (advisor)
This bachelor's thesis deals with embedded devices and their operating systems analysis for transfer of security email proxy into one of these devices. It also describes already existing project Mailproxy and techniques of email securing.
Application for monitoring and controlling the security of large LAN and WAN computer networks
Maloušek, Zdeněk ; Polívka, Michal (referee) ; Novotný, Vít (advisor)
Computer networks are used in much wider extent than 20 years ago. People use the computer mainly for communication, entertainment and data storage. Information is often stored only in electronic devices and that is why the security of the data is so important. The objective of my thesis is to describe network security problems and their solutions. First chapter deals with the network security, security checks and attacks. It describes procedures used in practise. First part deals with traffic scanning and filtering at various layers of the TCP/IP model. Second part presents the types of proxy and its pros and cons. Network Address Translation (NAT) is a favourite technique of managing IP addresses of inside and outside network which helps to improve the security and lower the costs paid for IP addresses. NAT description, IPSec, VPN and basic attacks are described in this section. The second chapter of the thesis presents set of Perl scripts for network security checking. The purpose of the project is not to check the whole network security. It is designed for contemporary needs of IBM Global Services Delivery Centrum Brno. The first script checks running applications on target object. The aim is to detect services that are not necessary to run or that are not updated. The second one checks the security of the Cisco device configuration. There is a list of rules that has to be kept. The third script inspects the Nokia firewall configuration which is on the border of IBM network. If some of the rule is broken, it shows the command that has to be proceeded at the particular device. The output of the first and the second script is an HTML file. The third script uses the command line for the final report. The last part of this chapter gives advice to configure Cisco devices. It is a list of security recommendations that can be used by configuring e.g. routers. The appendix presents two laboratory exercises. The aim is to give students an opportunity to learn something about programs and technologies which are used in practise by IT experts to check the weaknesses of their networks.
Advanced proxy for penetration testing
Válka, Michal ; Vilém,, Šlesinger (referee) ; Sedlák, Petr (advisor)
This master’s thesis focuses on improving the open-source proxy tool for penetration testing of thick clients. The thesis is divided into three main chapters, the first of which is focused on the theoretical background on which the thesis is based. The second chapter describes the analysis of the current state and defines user requirements, which must be met. The third chapter deals with increasing the quality and expanding the functionality based on user requirements. At the same time, a testing methodology is created and a vulnerable application is developed as a teaching material for the methodology. The chapter concludes with a summary of the economic costs and benefits of the application for the penetration testing process.
Proxy Server for Mobile Devices
Vašenka, Václav ; Chmelař, Petr (referee) ; Weiss, Petr (advisor)
This thesis should introduce principles of proxy servers. Main focus is on using proxy as a mediator between a web user, accessing the web from mobile devices and a web server. Next, this paper deals with web design and with aspects that have affect the speed and effectiveness of web page browsing via a proxy server. Moreover, the realization of such a system is described in this paper.

National Repository of Grey Literature : 34 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.