Project Ideas and Resources

Created Wednesday 28 October 2020



The typical topics: The scary hackity hack hacker knocking at your door


Keylogger

- Install and Demonstrate a Keylogger https://www.geeksforgeeks.org/ethical-hacking-keyloggers/

Passwords

- Consider and demostrate possible password creation/testing techniques.

Encryption

- Demonstrate strong and/or weak encryption. Consider asymmentric v symmetric

OS Vulnerabilities / Viruses / Malicious Code

- Set up a VM (probably windows) and test for/demonstrate vulnerabilities
- Explore and Test Vulnerabilities within the Internet of Things space
- Demonstrate the impact of a virus or other Malicious code
https://linuxhint.com/top_vulnerability_scanning_tools/


Firewalls / Penetration Testing

- Demonstrate the setup and use of a Firewall (i.e. a with/without scenario)


Packet Sniffing

- Analyze traffic on a network you control
https://www.linuxjournal.com/content/packet-sniffing-basics


Web/SQL Injection

- Demonstrate a cross-site scripting attack



More reality? Asymmetric (i.e. no "skin in the game") corporate IT led practices have led to inherently unsafe environments, and now there is cleanup to do.

Much like in other arenas, be VERY wary when the company says "it is your responsibility to do X." Why aren't THEY doing it, either as part of the service or as an extra paid service?

Backups

- Research and demonstrate automatic or manual backup systems
(e.g. Rsync, Syncthing, Borg)

Forensics

- Demonstrate data recovery or analysis on discovered or corrupted data
- Conversely, demonstrate reliable data destruction
https://linuxhint.com/kali_linux_forensics_tools/

Personal Data Integrity

- Explore and demonstrate ways to determine the status of your personal data and/or ways to keep it safe
- Understand and explain the general impossibility of the above
- Explore the Deep and or Dark Web


Personal device "safety"

- Explore and explain the possibilities and limits of safety on personal devices

Ransomware

- Explore and explain the ransomware problem and explore how to manage it


Anonymity

- Explore and explain the role of anonymity in using the web/ consider VPN and/or Tor etc.
https://tails.boum.org/

Phishing and other social engineering

- Explore and demonstrate social engineering techniques
https://www.hackingarticles.in/shellphish-a-phishing-tool/



Backlinks: FSU Courses:LIS4774