Project Ideas and Resources
Created Wednesday 28 October 2020
The typical topics: The scary hackity hack hacker knocking at your door
Keylogger
- Install and Demonstrate a Keylogger https://www.geeksforgeeks.org/ethical-hacking-keyloggers/
Passwords
- Consider and demostrate possible password creation/testing techniques.
Encryption
- Demonstrate strong and/or weak encryption. Consider asymmentric v symmetric
OS Vulnerabilities / Viruses / Malicious Code
- Set up a VM (probably windows) and test for/demonstrate vulnerabilities
- Explore and Test Vulnerabilities within the Internet of Things space
- Demonstrate the impact of a virus or other Malicious code
https://linuxhint.com/top_vulnerability_scanning_tools/
- Explore and Test Vulnerabilities within the Internet of Things space
- Demonstrate the impact of a virus or other Malicious code
https://linuxhint.com/top_vulnerability_scanning_tools/
Firewalls / Penetration Testing
- Demonstrate the setup and use of a Firewall (i.e. a with/without scenario)
Packet Sniffing
- Analyze traffic on a network you control
https://www.linuxjournal.com/content/packet-sniffing-basics
https://www.linuxjournal.com/content/packet-sniffing-basics
Web/SQL Injection
- Demonstrate a cross-site scripting attack
More reality? Asymmetric (i.e. no "skin in the game") corporate IT led practices have led to inherently unsafe environments, and now there is cleanup to do.
Much like in other arenas, be VERY wary when the company says "it is your responsibility to do X." Why aren't THEY doing it, either as part of the service or as an extra paid service?
Backups
- Research and demonstrate automatic or manual backup systems
(e.g. Rsync, Syncthing, Borg)
(e.g. Rsync, Syncthing, Borg)
Forensics
- Demonstrate data recovery or analysis on discovered or corrupted data
- Conversely, demonstrate reliable data destruction
https://linuxhint.com/kali_linux_forensics_tools/
- Conversely, demonstrate reliable data destruction
https://linuxhint.com/kali_linux_forensics_tools/
Personal Data Integrity
- Explore and demonstrate ways to determine the status of your personal data and/or ways to keep it safe
- Understand and explain the general impossibility of the above
- Explore the Deep and or Dark Web
- Understand and explain the general impossibility of the above
- Explore the Deep and or Dark Web
Personal device "safety"
- Explore and explain the possibilities and limits of safety on personal devices
Ransomware
- Explore and explain the ransomware problem and explore how to manage it
Anonymity
- Explore and explain the role of anonymity in using the web/ consider VPN and/or Tor etc.
https://tails.boum.org/
https://tails.boum.org/
Phishing and other social engineering
- Explore and demonstrate social engineering techniques
https://www.hackingarticles.in/shellphish-a-phishing-tool/
Backlinks: FSU Courses:LIS4774