National Repository of Grey Literature 144 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Technological IT Course for Internal Education
Orlíček, Michal ; Ryšavý, Ondřej (referee) ; Pluskal, Jan (advisor)
The aim of this bachelor's thesis is to create a technological course on C# programming language for internal education. Prior to the creation of the course itself, the research of relevant study materials, presentation technologies, and development environments was done. From that research, it was possible to choose the appropriate length of the course, its language, the structure of suitable materials, and technologies which were used to create these materials. Additional documents, such as the study plan, the timetable, the annotations, the prerequisites, and the list of the acquired knowledge, are created as well. Last but not least, there are course materials themselves, which contains thirteen theoretical presentations suited for lectures and five practical exercises.
Financial Protocol Simulator
Vymlátil, Martin ; Pluskal, Jan (referee) ; Veselý, Vladimír (advisor)
This paper deals with the creation of a simulator for financial protocols ISO8583 and SPDH.The simulator was designed and implemented in C++ language based on the analysis of the financial protocols. The simulator was tested on pre-prepared authorization messages and was also tested against the real POS terminal. Possible extensions for the simulator were discussed at the end of this thesis.
WiFi Attacks Using ESP32/8266
Stehlík, Richard ; Zobal, Lukáš (referee) ; Pluskal, Jan (advisor)
The goal of this thesis is an exploration of the possibilities of Espressif's ESP32 chips in combination with Espressif IoT Development Framework with intention of implementing well-known Wi-Fi attacks on this platform. In this work, multiple implementation proposals were done for deauthentication attack in two variants followed by WPA/WPA2 handshake capture, attack on PMKID, creation of rogue MitM access point, or brute-force attack on WPS PIN, and more. A universal penetration tool ESP32 Wi-Fi Penetration Tool was proposed and implemented, including deauthentication attacks with WPA/WPA2 handshake capture. This tool provides an easy way to configure and run malicious Wi-Fi attacks without any domain knowledge required from the user. The outcome of this work opens new attack vectors for the attacker, thanks to cheap, ultra-low powered, and lightweight ESP32 chips.
Reconstruction of Captured Communication on iOS Platform
Letavay, Viliam ; Kmeť, Martin (referee) ; Pluskal, Jan (advisor)
These days our mobile devices along with social networks are giving us an opportunity to be in touch with our friends and family at any time. Howerver they could be also used for criminal activity. This thesis therefore deals with reconstruction of communication of the iOS applications Google Hangouts, Twitter and Facebook Messenger for use of forensics analysis with the main focus on an abillity to recover their chat communication. Later it also deals with the implementation of Netfox Detective tool extensions, allowing the reconstruction of this communication.
Network Forensic Analytical Web-Based Platform
Ambrož, Tomáš ; Veselý, Vladimír (referee) ; Pluskal, Jan (advisor)
At present a big part of communication passes through computer network. Amount of the communication increases every year. That is why the claims on computing power raise. The procedure of the communication processing for forensic purposes is worth paralleling to increase the computing power. Research group NES@FIT created an instrument Netfox Detective in one of its projects. From this instrument it is planned to create a distributed system for the processing of intercepted communication for the purpose of forensic analysis. Interface is one of the parts, with its help the distributed system will be operated. In my theses I will concern with the creation of the web interface for the instrument Netfox Detective which is a desktop application presently. Web interface, after little modifications, will be used for paralleled version of application. Web interface will mediate the same informations as the desktop version. To obtain information for forensic analysis it will use framework Netfox Framework identically as the desktop version. Advantage of web interface compared to the desktop version is that a user who approaches web interface will need a device with web browser. It means that a user can work with any operation system.
DNS Resolver Testing
Široký, Filip ; Pluskal, Jan (referee) ; Grégr, Matěj (advisor)
Tento dokument popisuje automatizaci tvorby scénářů pro nástroj Deckard, který slouží na testování rekurzivních resolverů. Tyto scénáře jsou založeny na skutečném provozu mezi prohlížečem a webovou stránkou zachyceném při načítání této stránky. Výsledný scénář je doplněn i o dotazy, které v zachyceném provoz nebyly, ale na které by se resolver mohl ptát například při minimalizaci dotazu. Na rozdíl od živého provozu by použití scénářů mělo zajistit deterministické prostředí pro testování. Reálný provoz není pro testování ideální kvůli například rotaci IP adres, rozdílnému obsahu serverů a úpravy obsahu. Scénář by měl obsahovat všechny odpovědi na dotazy, na které by se resolver mohl zeptat. S vygenerovanými scénáři můžeme porovnávat odpovědi různých implementací a verzí DNS resolveru. Můžeme tak odhalit změny v jejich chování.
A Gateway for Xiaomi Aqara Devices
Urbánek, Petr ; Koutenský, Michal (referee) ; Pluskal, Jan (advisor)
This paper deals with creating gateway for smart devices of brand Aqara.    There is discussed ecosystem of Aqara devices, which are used for testing and reverse-engineering of communication.    The Gateway is implemented on platform ESP32, which is using cc2530 system-on-chip.   Newly made gateway makes a bridge between ZigBee and MQTT protocol, which provides connectivity betweeen sensors and actors from Aqara and Home Assistant. Thanks to the Home Assistant are all data about home safe and creating new home automatizations is a lot easier.
Automation and Accounting of Coffee Machine
Víšek, Jakub ; Ryšavý, Ondřej (referee) ; Pluskal, Jan (advisor)
The goal of this thesis is to design and implement an embedded and information system for automatic accounting of coffee dispensed by a vending machine. Features of the created solution include reliability and portability. The system can be easily extended for use in point of sale applications different to coffee machines. The results enable easy deployment of electronic accounting of purchased products and demonstrate integration of a microcontroller which controls a coffee vending machine on the basis of identifying users by their RFID tags.
Automatic Honeypots Deployment and Data Gathering
Ďuriš, Tomáš ; Pluskal, Jan (referee) ; Zobal, Lukáš (advisor)
This work deals with honeypots deployment automation, data collection from honeypots and the deployment of a monitoring system with alerts. The aim was to study the issue of honeypots, choose tools for their deployment, maintenance and collection of provided data together with creation of automatic deployment system for multiple types of honeypots. The first part of the work is devoted to the theory of honeypots, their distribution and type. Furthermore, the work mentions the comparison of individual configuration tools. The practical part is devoted to the use of a selected configuration tool Ansible in cooperation with existing open-source applications to build a fully automated system for the deployment and monitoring of honeypots, collection of provided data and their visualization. Puppet
Social Networks Reconstruction of Captured Communication
Dudek, Jindřich ; Kmeť, Martin (referee) ; Pluskal, Jan (advisor)
We live in a modern world surrouded by many forms of information technology. Majority of communication among people is realized through the internet and usage of social networks is everyday matter which leads to reduction of personal communincation and to higher usage of dating sites. However these sites are often a place where potentinal deliquents occure. This thesis deals with reconstruction of captured communication from social networks Lidé.cz and Xchat. Man-in-the-middle attack was used to capture data needed for analysis of communication protocols. Bachelor thesis focuses on identification of communication methods of social networks mentioned above and on analysis of their communication protocols. From these communication protocols are chosen events interesting for forensic analysis. Result of this thesis is an extension which provides support of the communication protocols for application Netfox Detective.

National Repository of Grey Literature : 144 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.