National Repository of Grey Literature 33 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Social Networks Reconstruction of Captured Communication
Dudek, Jindřich ; Kmeť, Martin (referee) ; Pluskal, Jan (advisor)
We live in a modern world surrouded by many forms of information technology. Majority of communication among people is realized through the internet and usage of social networks is everyday matter which leads to reduction of personal communincation and to higher usage of dating sites. However these sites are often a place where potentinal deliquents occure. This thesis deals with reconstruction of captured communication from social networks Lidé.cz and Xchat. Man-in-the-middle attack was used to capture data needed for analysis of communication protocols. Bachelor thesis focuses on identification of communication methods of social networks mentioned above and on analysis of their communication protocols. From these communication protocols are chosen events interesting for forensic analysis. Result of this thesis is an extension which provides support of the communication protocols for application Netfox Detective.
Forensic Analysis of Communication Tools
Lipovský, Tomáš ; Rychlý, Marek (referee) ; Očenášek, Pavel (advisor)
This paper deals with techniques and procedures of forensic analysis with focusing on the internet communication. Part of this work is comparison of existing applications for forensic analysis of communication tools, design and implementation of its own application. Created application enables obtaining and filtration selected computer data for later analysis.
Evidence securing in virtual environment
Havlová, Miluše ; Malina, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
The bachelor thesis deals with evidence securing in virtual environment. The main goal is to suggest suitable virtual environment for evidence securing which can be used in prosecution. As the next the tools that are suitable for safe securing of evidence are described. With the help of selected tools the sample of malware is secured and then the sample is analyzed and described. The suggested environment is used to evidence gathering within the frame of simulated security incident.
Forensic Analysis of Cryptocurrency Mining Servers
Kelečéni, Jakub ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
This thesis focuses on the mining of cryptocurrency with emphasis on analysis of communication between miner and server. It describes basic principles of cryptocurrencies, mining and employed communication protocols. The next part of thesis is about design and implement modification of existing system (catalogue). This modification will add temporality to the catalog, what increase reliability of stored metadata. Description, functionality and purpose of existing system is included in the next text.
Forensic Analysis of Network Connection in OS Linux
Jurinek, Róbert ; Rychlý, Marek (referee) ; Očenášek, Pavel (advisor)
This thesis focuses on forensic analysis of network connection in operating systems based on Linux kernel. The paper is divided into chapters that describe principles of digital forensics, packet processing inside Linux kernel and compare forensic software tools. This knowledge is then applied in design of application for network connection forensics in Linux. Designed application is implemented and used in practical process of digital forensic analysis. In conclusion possible extensions are proposed.
Forensic Analysis in Windows OS
Manda, David ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
The thesis is focused on digital forensic analysis in operating system Windows. The purpose of this thesis is to provide a preview to the techniques and procedures forensics analysis. There are disclosed available software tools used during forensic analysis. The part of this thesis is also practical process of forensic analysis and developing forensic report
Forensic Malware Analysis
Král, Benjamin ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This master's thesis describes methodologies used in malware forensic analysis including methods used in static and dynamic analysis. Based on those methods a tool intended to be used by Computer Security Incident Response Teams (CSIRT) is designed to allow fast analysis and decisions regarding malware samples in security incident investigations. The design of this tool is thorougly described in the work along with the tool's requirements on which the tool design is based on. Based on the design a ForensIRT tool is implemented and then used to analyze a malware sample Cridex to demonstrate its capabilities. Finally the analysis results are compared to those of other comparable available malware forensics tools.
Security Analysis of Immersive Virtual Reality and Its Implications
Vondráček, Martin ; Ryšavý, Ondřej (referee) ; Pluskal, Jan (advisor)
Virtuální realita je v současné době využívána nejen pro zábavu, ale i pro práci a sociální interakci, kde má soukromí a důvěrnost informací vysokou prioritu. Avšak bohužel, bezpečnostní opatření uplatňovaná dodavateli softwaru často nejsou dostačující. Tato práce přináší rozsáhlou bezpečnostní analýzu populární aplikace Bigscreen pro virtuální realitu, která má více než 500 000 uživatelů. Byly využity techniky analýzy síťového provozu, penetračního testování, reverzního inženýrství a dokonce i metody pro application crippling. Výzkum vedl k odhalení kritických zranitelností, které přímo narušovaly soukromí uživatelů a umožnily útočníkovi plně převzít kontrolu nad počítačem oběti. Nalezené bezpečnostní chyby umožnily distribuci škodlivého softwaru a vytvoření botnetu pomocí počítačového červa šířícího se ve virtuálních prostředích. Byl vytvořen nový kybernetický útok ve virtální realitě nazvaný Man-in-the-Room. Dále byla objevena bezpečnostní chyba v Unity engine. Zodpovědné nahlášení objevených chyb pomohlo zmírnit rizika pro více než půl milionu uživatelů aplikace Bigscreen a uživatele všech dotčených aplikací v Unity po celém světě.
Forensic Analysis of Discs and Metadata under OS Linux
Kocnová, Jitka ; Rychlý, Marek (referee) ; Očenášek, Pavel (advisor)
This bachelor's thesis is about forensic analysis of memory devices and their metadata. It's part is also an application for Linux system which focuses on restoring data from memory devices using EXT, UDF and ISO 9660 file systems; and also some examples for educational use. The application was written in the C++ language and restores files by searching for their start and end tags. The application was tested on real data and it was also compared with already existing similar applications. As a result, it was found out that the application is successful even if there is no chance to work with informations stored in journal file of EXT file system, that is used by some of the other programs the application was compared with.
Analysis of Security Properties in OS Android
Hanyáš, Martin ; Rychlý, Marek (referee) ; Očenášek, Pavel (advisor)
This thesis describes operating system Android and its security aspects. Furthermore, the thesis will focus on the forensics analysis of this operating system. The aim is to create forensics application which allows to get sensitive data as well as to make forensic analysis using established tools, and to create background materials for teaching.

National Repository of Grey Literature : 33 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.