National Repository of Grey Literature 15 records found  previous11 - 15  jump to record: Search took 0.01 seconds. 
Cyberattack Generator
Gregr, Filip ; Smékal, David (referee) ; Hajný, Jan (advisor)
This thesis is focused on developing a tool that is capable of generating cyber attacks. In the opening there are introduced some attacks using the ISO/OSI application layer protocols. Specifically, these are attacks known as Slowloris, RUDY, Slow Read, HTTP flood, and dictionary attack on the SSH. These attacks are implemented into an existing DoSgen Linux tool that already contains several famous network attacks. The main part of the thesis is devoted to the description of the tool and to the implementation of its own extension. The created tool is practically tested in an experimental enviroment against the Apache web server. Part of the thesis is the documentation for the improved DoSgen tool.
Analysis and Demonstration of Selected Wireless Attacks in OS Windows
Husár, Michal ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This bachelor thesis descibes available technologies used for securing wireless networks and their weaknesses and imperfections. In the thesis there are described network attacks performed on the Windows platform, which abuse these weaknesses. Thesis is also devoted to creation of demonstration video and written instructions for each attack, which can be used for teaching network security.
Network Attack Capture Using Honeyd Tool
Bláha, Lukáš ; Chmelař, Petr (referee) ; Drozd, Michal (advisor)
The bachelor thesis deals with Honeyd tool and its effectivity in capturing network attacks. At the beginning, there is a description of honeypots and its utilization in network security. An important part of the thesis is constituted by a practical implementation of network attacks and their analysis. The main goal is to create an extension for Honeyd tool which can emulate file sharing in operation systems Microsoft Windows XP, especially its free accessible part called null session. As results there are tests evaluating the level of detection of computer attacks by the created tool.
Cracking of the Substitution Cyphers in Classical Cryptography
Kulich, Martin ; Doležel, Michal (referee) ; Stružka, Jaroslav (advisor)
The thesis provides a tool for automatic monoalphabetic substitution ciphers cracking using most common words dictionary. It is based on some previous solutions for english language which were not designed for cracking ciphertext without word divisions. This thesis is focused on cracking ciphertexts without word divisions. It also looks at specifics of czech language - declension and its influence on dictionary size.
Password deposition techniques in operating systems
Pavlík, Martin ; Růčka, Lukáš (referee) ; Hajný, Jan (advisor)
This master thesis deals with ways to store passwords in current operating systems. Specifically, this work focuses on Windows, Linux, BSD and OS X. These systems are examined for ways of hashing passwords and on resistance of resulting hashes against various attacks. First (theoretical) section describes the procedures and algorithms that are needed for user authentication. This part also describes methods of hash storing. At the end of the theoretical part are generally described some possible attacks against hash functions. In second (practical) part is described and tested tools for obtaining hashes of the investigated operating systems. Subsequently practical attacks were conducted against obtained hashes by using appropriate tools. Furthermore there are presented results of the attacks. In the conclusion of the work there is a comparison of tools and methods which were used to obtain plaintext passwords from operating systems.

National Repository of Grey Literature : 15 records found   previous11 - 15  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.