Diploma thesis describes published attacks on computers and computer networks. Principles of footprinting such as availability check, OS detection, port scanning were described. Next part explains attacks on confidentiality, integrity and availability. In the practical part were created four laboratory tasks and a virtual environment which allowed testing of ARP spoofing, DNS spoofing, SSL strip, Cross-site scripting, SQL injection, flooding attacks (TCP, ICMP, UDP), TCP reset and attack on operating system using backdoor with Metasploit framework. In practical part were also created video samples with attacks and documentation for teachers
Theoretical part of this thesis is dedicated to describing basic terms of network communication. Usa...
Client-Server Architecture Systems are the mostly used systems architecture worldwide. They entail p...
The aim of this thesis is to design a laboratory exercise presenting an application firewall. The fi...
This thesis describes principles of specific HTTPS attacks and provides realization of attacks using...
The objective of this thesis was to explore the different types of cyber-attack, phases of an attack...
This bachelor's thesis contains theory of network attacks, attacks description and defense against t...
This work is focused on penetration testing of web applications. The theoretical part describes this...
This bachelor thesis is divided into two parts. The theoretical part describes security systems, var...
TITLE: Attacks on computers, servers and services. SUMMARY: The aim of theoretical part is to descri...
This thesis describes network attacks that focus on the local networks and operating system Windows....
The objective of this lab is to help students understand cross-site-request forgery (CSRF or XSRF) a...
Data breaches in networks are a common issue in Internet Technology. Virtual environments are hidden...
Bachelor thesis deals with the security of computer networks based on TCP/IP protocol stack. The mai...
Penetration testing is a form of security auditing that attempts to measure both the target organiza...
Bachelor thesis introduces the basic terms related to work on the website. Describes the various thr...
Theoretical part of this thesis is dedicated to describing basic terms of network communication. Usa...
Client-Server Architecture Systems are the mostly used systems architecture worldwide. They entail p...
The aim of this thesis is to design a laboratory exercise presenting an application firewall. The fi...
This thesis describes principles of specific HTTPS attacks and provides realization of attacks using...
The objective of this thesis was to explore the different types of cyber-attack, phases of an attack...
This bachelor's thesis contains theory of network attacks, attacks description and defense against t...
This work is focused on penetration testing of web applications. The theoretical part describes this...
This bachelor thesis is divided into two parts. The theoretical part describes security systems, var...
TITLE: Attacks on computers, servers and services. SUMMARY: The aim of theoretical part is to descri...
This thesis describes network attacks that focus on the local networks and operating system Windows....
The objective of this lab is to help students understand cross-site-request forgery (CSRF or XSRF) a...
Data breaches in networks are a common issue in Internet Technology. Virtual environments are hidden...
Bachelor thesis deals with the security of computer networks based on TCP/IP protocol stack. The mai...
Penetration testing is a form of security auditing that attempts to measure both the target organiza...
Bachelor thesis introduces the basic terms related to work on the website. Describes the various thr...
Theoretical part of this thesis is dedicated to describing basic terms of network communication. Usa...
Client-Server Architecture Systems are the mostly used systems architecture worldwide. They entail p...
The aim of this thesis is to design a laboratory exercise presenting an application firewall. The fi...