National Repository of Grey Literature 7 records found  Search took 0.01 seconds. 
Testing the response of operating systems to different IPv6 flows
Ruiner, Michal ; Polák, Ladislav (referee) ; Jeřábek, Jan (advisor)
The aim of the thesis is to create an array of virtual machines and research their response to the IPv6 protocol. Another significant part is to utilize the provided tool for generating and sniffing IPv6 traffic and verify its correct functionality. For such purpose, the GNS3 open-source software is selected. A~reader is familiarized with the concepts of virtualization, GNS3 functionality and various methods of software testing together with the implemented practical models. The IPv6 protocol is introduced in detail as well as the packet format, address types and several IPv6 protocols useful for the thesis. The practical part is discussed in the Numerical results chapter. The topology is established and connectivity verified using IPv4. Configuration of static IPv6 addresses is performed on the devices as well as configuration of router to distribute particular prefixes. 5 testing scenarios are proposed that increase the input load to the tool in sense of higher number of addresses for the 3 different modes - passive, active and aggressive. 3 scripts were developed. Performance testing script measures utilization of computational resources. The other 2 scripts perform packet capturing and further analysis to compare the results of proposed scripts with provided tool. The comparison is done utilizing passive and aggressive modes. Active mode is used to observe the response of various operating systems to different IPv6 flows. Specifically, multiple Windows 10 builds, Linux distributions, Windows XP, 7, 11, macOS and Android.
Network Scanner for PowerShell
Sabota, Dominik ; Šeda, Pavel (referee) ; Martinásek, Zdeněk (advisor)
This study focuses on the development and implementation of a network scanning tool for the scripting language Powershell version 5.1 and higher. This tool, named Oculus, was specifically designed for the use of sophisticated network scanning methods during penetration testing and other security audits, thereby becoming part of the broader context of cybersecurity. Within the set requirements and limitations, the Oculus tool was successfully implemented. This work thoroughly analyzes the process of development and implementation of this tool, its limitations, and their impact on overall effectiveness, which is subsequently tested and evaluated. Although the development process brought certain challenges, the testing results confirmed that the Oculus tool provides valuable outputs, thereby confirming its usability in the matter of improving cybersecurity.
Mobile Application for Network Scanning
Teuchner, Marek ; Bartoš, Václav (referee) ; Kováčik, Michal (advisor)
The subject of this bachelor's thesis is to design and implement an application for Android operating system that allows the discovery of all connected devices in a local network and to display information about it and all of its devices. The application would allow the user to assign a custom icon and a note to each device within the network. Logs and statistics are also collected by the application. In addition, it is possible to attack the selected device using various Denial of Service attacks.
Detection of Network Attacks Using Tshark
Dudek, Jindřich ; Ryšavý, Ondřej (referee) ; Holkovič, Martin (advisor)
This diploma thesis deals with the design and implementation of a tool for network attack detection from a captured network communication. It utilises the tshark packet analyser, the meaning of which is to convert the input file with the captured communications to the PDML format. The objective of this conversion being, increasing the flexibility of input data processing. When designing the tool, emphasis has been placed on the ability to expand it to detect new network attacks and on integrating these additions with ease. For this reason, the thesis also includes the design of a complex declarative descriptions for network attacks in the YAML serialization format. This allows us to specify the key properties of the network attacks and the conditions for their detection. The resulting tool acts as an interpreter of proposed declarative descriptions allowing it to be expanded with new types of attacks.
Network Scanner for PowerShell
Sabota, Dominik ; Šeda, Pavel (referee) ; Martinásek, Zdeněk (advisor)
This study focuses on the development and implementation of a network scanning tool for the scripting language Powershell version 5.1 and higher. This tool, named Oculus, was specifically designed for the use of sophisticated network scanning methods during penetration testing and other security audits, thereby becoming part of the broader context of cybersecurity. Within the set requirements and limitations, the Oculus tool was successfully implemented. This work thoroughly analyzes the process of development and implementation of this tool, its limitations, and their impact on overall effectiveness, which is subsequently tested and evaluated. Although the development process brought certain challenges, the testing results confirmed that the Oculus tool provides valuable outputs, thereby confirming its usability in the matter of improving cybersecurity.
Detection of Network Attacks Using Tshark
Dudek, Jindřich ; Ryšavý, Ondřej (referee) ; Holkovič, Martin (advisor)
This diploma thesis deals with the design and implementation of a tool for network attack detection from a captured network communication. It utilises the tshark packet analyser, the meaning of which is to convert the input file with the captured communications to the PDML format. The objective of this conversion being, increasing the flexibility of input data processing. When designing the tool, emphasis has been placed on the ability to expand it to detect new network attacks and on integrating these additions with ease. For this reason, the thesis also includes the design of a complex declarative descriptions for network attacks in the YAML serialization format. This allows us to specify the key properties of the network attacks and the conditions for their detection. The resulting tool acts as an interpreter of proposed declarative descriptions allowing it to be expanded with new types of attacks.
Mobile Application for Network Scanning
Teuchner, Marek ; Bartoš, Václav (referee) ; Kováčik, Michal (advisor)
The subject of this bachelor's thesis is to design and implement an application for Android operating system that allows the discovery of all connected devices in a local network and to display information about it and all of its devices. The application would allow the user to assign a custom icon and a note to each device within the network. Logs and statistics are also collected by the application. In addition, it is possible to attack the selected device using various Denial of Service attacks.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.