Project for the ITRI625 (Computer Security II) module. Two scenarios are covered.
The Blog for this project was hosted on GitHub Pages at ITRI625.github.io
The following knowledge was needed before we began this project
- Linux and the Command Line
- Virtual Machines
- Networks, File Management, and Operating Systems
- Scripting, and Programming in general
- Excellent debugging skills
The Documentation compiled for this project can be found here
The first scenario dealt with an exploit carried out on a virtual machine loaded with an .iso image of Android-x86
The second scenario dealt with an exploit carried out on a virtual machine loaded with an .iso image of Windows 7
A lot of Googling, as well as additional research on Forums, Websites, and YouTube
- Conduct background research
- Install VMs
- Install Metasploit
- Install Android Studio for Emulator
- Run exploits
- Exploit 1 - SMS on Emulator
- Exploit 2 - Windows based exploit
- Compile Documentation
- Front Page
- Table of Contents
- Exploit 1
- Exploit 2
- Reflection and Work Consensus
- Additional readings and miscellaneous information
- Bibliography/References
- Create Blog
- Get a template for a basic blog
- Add Scenario 1 to Blog
- Add Scenario 2 to Blog
- Update Contact, About Us and Home Page