National Repository of Grey Literature 4 records found  Search took 0.01 seconds. 
Analysis and Demonstration of Selected Network Attacks in OS Windows
Hanyáš, Martin ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This thesis describes network attacks that focus on the local networks and operating system Windows. The aim is to create materials for teaching the elective course Security and Computer Networks which is taught at the Faculty of Information Technology Brno University of Technology.
Collection of laboratory works for demonstration of computer attacks
Plašil, Matouš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
Diploma thesis describes published attacks on computers and computer networks. Principles of footprinting such as availability check, OS detection, port scanning were described. Next part explains attacks on confidentiality, integrity and availability. In the practical part were created four laboratory tasks and a virtual environment which allowed testing of ARP spoofing, DNS spoofing, SSL strip, Cross-site scripting, SQL injection, flooding attacks (TCP, ICMP, UDP), TCP reset and attack on operating system using backdoor with Metasploit framework. In practical part were also created video samples with attacks and documentation for teachers.
Analysis and Demonstration of Selected Network Attacks in OS Windows
Hanyáš, Martin ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This thesis describes network attacks that focus on the local networks and operating system Windows. The aim is to create materials for teaching the elective course Security and Computer Networks which is taught at the Faculty of Information Technology Brno University of Technology.
Collection of laboratory works for demonstration of computer attacks
Plašil, Matouš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
Diploma thesis describes published attacks on computers and computer networks. Principles of footprinting such as availability check, OS detection, port scanning were described. Next part explains attacks on confidentiality, integrity and availability. In the practical part were created four laboratory tasks and a virtual environment which allowed testing of ARP spoofing, DNS spoofing, SSL strip, Cross-site scripting, SQL injection, flooding attacks (TCP, ICMP, UDP), TCP reset and attack on operating system using backdoor with Metasploit framework. In practical part were also created video samples with attacks and documentation for teachers.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.