Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Timestamp Enter your group name, section and id Type

All section 2
1. Kenna Tefera -- UGR/0317/12
2. Rediet Ferew -- UGR/1415/12
3. Endale Yohannes -- UGR/7379/12
4. Tesfaye Adugna -- UGR/4709/12
5/27/2022 11:45:21 5. Abel Yohannes -- UGR /8254/12 OS Security

1. Betel Tagesse……..……UGR/5409/12
2. Feven Belay ……………..UGR/3979/12
3. Feven Tolla……………….UGR/4493/12
4. Mekdes Kebede………..UGR/3127/12
5. Tigist Zelalem……………UGR/1852/12
5/27/2022 11:50:02 6. Tigist Wondimneh…….UGR/2538/12
Application Security
Dagem Tadesse - UGR/7445/12 section 03
Helawit Abraham - UGR/2966/12 section 03
Naomi Timoteos - UGR/7593/12 section 02
Nazrawi Demeke - UGR/1209/12 section 02
Shalom Girma - UGR/0528/12 section 02
Tsega Yakob - UGR/8465/12 section 02
5/27/2022 12:08:10 Yeabsra Leulseged - UGR/6049/12 section 03

1.Nahom Senay Getachew UGR/9334/12 sec 2


2.Fikremariam Fikadu Deme UGR/9125/12 sec 2
3.Beimnet Bekele Guta UGR/3739/12 sec 1
4.Tewodros Alemu Fikru UGR/7621/12 sec 2
5/27/2022 12:29:19 5.Paulos Dessie Nedaw UGR/6972/12 sec 3
Web Security
Name Section ID
1. Abraham Atlaw 3 ---UGR/3423/12
2. Aklile Yilma 3 ---UGR/7107/12
3. Henok Mekuanint 1 ---UGR/2272/12
4. Joshua Tesfaye 2 ---UGR/0359/12
5. Samuel Girma 1 ---UGR/6303/12
6. Temesgen zewde 2 ---UGR/3848/12
5/27/2022 12:29:29 7. Etsibdink Demeke 3---- UGR/6421/12
1. Melat Ermiya UGR/8994/12 Section 3
2. Zenamarkos Molla UGR/4176/12 Section 3
3. Gemechis Urgessa UGR/7128/12 Section 3
4. Zeamanuaual Feleke UGR/8657/12 Section 3
5/27/2022 12:29:44 5. Getnet Adugna UGR/3381/12 Section 3
Web Security
1. Abraham shimekit -----------UGR/0129/12--- SECTION -1
2. Bamlaku Hiruy -------------UGR/4774/12 -------SECTION-3
3. Bisrat Walle -----------------UGR/4425/12 --------SECTION-3
4. Haile Dereje ---------------UGR/2190/12 ---------SECTION -3
5. Yishak Bazezew ---------UGR/1131/12 ---------SECTION -3
5/27/2022 12:32:12
name id section
1.Gizaw Dagne ............UGR/6640/12....................2
2.Hayat Tofik................UGR/2987/12....................2
3.Kaleab Tekalign........UGR/3664/12.....................2
4.Mihiret Dessalegn.....UGR/1089/12.....................2
5.Metsinanat Asfaw.....UGR/7631/12....................1
6.Eden Tadesse...........UGR/5256/12.....................3
5/27/2022 12:38:33 7.Feven Dereje..............UGR/9461/12....................3

Web Security

NAME SECTION ID
1,Seblewongel Girmaw ............section 3..........UGR/5682/12
2,Kidus Sintayehu .....................section3..........UGR/8503/12
3, Degsew Abebaw....................section1........ UGR/1341/12
4,Fenet Shewarega ...................section1....... UGR/9003/12
5, Dagim Fikru............................section2......... UGR/4328/12
6,Melat Mesele..........................section1........... UGR/9429/12

5/27/2022 12:40:57
BRUK TEDLA TAFESSE UGR/8396/12 SECTION 1
ABDULAZIZ ALI UGR/5744/12 SECTION 1
HAILEMARIAM AREGA UGR/7412/12 SECTION 3
BIRUK TASSEW UGR/2004/12 SECTION 3
5/27/2022 12:50:13 BIRUK ANLEY UGR/3923/12 SECTION 1

Liban Abduba UGR/3781/12.....section 1


Naol kecha UGR/6903/12....section 1
Jebessa Dejene UGR/0459/12.....section 1
Abel Mekonen UGR/7784/12.....section 1
Tamirat Dereje UGR/5111/12.....section 3
5/27/2022 13:00:38 Dinka Efa UGR/3476/12.....section 3 Application Security

1.Abdulkarim Getachew-1-UGR/7992/12
2.Bereket Asnake-3-UGR/9574/12
3.Hailemariam Kefale-3-UGR/0652/12
4.Petros Beyene-1-UGR/1308/12
5.Surafel Getahun-2-UGR/5965/12
5/27/2022 13:03:57 6.Teshome Nbret-2-UGR/3281/12

Kaleab Taye --UGR/0490/12 --sec2

Estifanos Neway --UGR/4776/12 --sec2

Beka Dessalegn --UGR/4605/12 --sec 2

Nebiyu Yohannes --UGR/8159/12 --sec 3

Yonathan Tessema- -UGR/5102/12 - -sec 1

Bethlehem Alula—UGR/0462/12–sec 2

Lidiya Melaku - - UGR/3565/12- - sec 2


5/27/2022 13:11:50 Web Security
1. Eyob Zebene 2 UGR/5067/12
2. Behailu Abera 3 UGR/3464/12
3. Gifti Mulugeta 1 UGR/6377/12
4. Roza Kassaa 1 UGR/2571/12
5/27/2022 13:15:57 5. Selamawit Siferh 1 UGR/1822/12
Hawi Tena …….. UGR/8124/12
Tsion Guesh ………UGR/7807/12
Veronica Getahun.. UGR/2022/12
5/27/2022 13:22:53 Yonas Awraris…… UGR/5114/12 Web Security

Name: ID Section
1. Naol Aklilu UGR/0207/12 2
2. Muluken Hakim UGR/1110/12 1
3. Gizaw Agodo UGR/8917/12 1
4. Addisu Motora UGR/4230/12 1
5. Usmael Abdurahman UGR/6575/12 2
5/27/2022 13:23:58 6. Abinet Anamo UGR/7110/12 1

# HENOK MATHEAS UGR/2553/12 SECTION-2


# KALEABE NEGUSSIE UGR/3411/12 SECTION-1
# NATNAEL TADELE UGR/0415/12 SECTION-3
# YARED NAMSSI UGR/1548/12 SECTION-3
# YARED TEGEGN UGR/7066/12 SECTION-3
# ZERABRUCK MULUNEH UGR/0492/12 SECTION-1
5/27/2022 13:33:00 # ZERIHUN MOGES UGR/8349/12 SECTION-3 OS Security
Dagmawi Adam Sec 3 UGR/1527/12
Fikir Fikre Sec 3 UGR/6193/12
Genzeb Alemu Sec 2 UGR/9822/12
Aksumawit Yemane Sec 3 UGR/5297/12
5/27/2022 13:39:38 Application Security
1,Felmeta Muktar ................ UGR/3555/12.......Section....02
2,Habib Gemmechu--------------UGR/4012/12.......Section....01
3,Jabir Esmael ---------------------UGR/3314/12.......Section....01
5/27/2022 13:41:21 4,Segni Desta -----------------------UGR/8852/12.......Section....01
Bierhan Anteneh ___UGR/4886/12___sec2
Tseganesh Yifru___UGR/3970/12___sec1
Ekram Kedir___UGR/9671/12___sec2
Bereket Demissie___UGR/0587/12___sec2
5/27/2022 13:42:57 Tsedalemariam Asrat___UGR/3446/12___sec1

Name Id Section
1. Segni Desalegn UGR/8961/12 3
2. Amha Kindu UGR/8415/12 1
3. Kaleab Kindu UGR/8121/12 2
4. Gadisa Amenu UGR/8440/12 2
5. Habtamu Tsegaye UGR/7096/12 3
5/27/2022 13:43:46 6. Hayat Ebrahim UGR/1897/12 1 Web Security

Christina Solomon UGR/8231/12


Jeal Sabir UGR/0113/12
Hiwot Derese UGR/2790/12
Sosna Worku UGR/3804/12
Rut Berihanu UGR/8243/12
Helen Belete UGR/9526/12
Ruhama Gashaw UGR/9496/12
5/27/2022 13:47:24
YARED TSEGAYE 2 UGR/8284/12
ELSAI DERIBU 2 UGR/0066/12
DURESSA JEMAL 2 UGR/3937/12
BEREKET TILAHUN 2 UGR/9703/12
YEABSIRA DRIBA 1 UGR/4951/12
5/27/2022 13:52:59 YOHANNES ASFAW 1 UGR/0327/12 Web Security

Estifanos Bireda------------Sec. 3--------------------UGR/6051/12


· Samuel Kifle ---------------Sec. 2-------------------- UGR/4797/12
· Simon Mekonnen ---------Sec 3 ---------------------UGR/9508/12
· Semir Ahmed --------------Sec. 2-------------------- UGR/9996/12
· Yoseph Habtamu-----------Sec. 2-------------------- UGR/9364/12
. Ephrem Alemayehu—-----Sec.2—------------------UGR/4365/12
5/27/2022 13:54:40 . Dagemawi Yesuf—---------Sec.1—-------------------UGR/3493/12
Name ID Section
1-Betelihem Mengist ugr/4777/12 3
5/27/2022 13:56:18 2-Jerusalem Girma ugr/4970/12 3 Web Security

Group members
1. Kenna Tefera -- UGR/0317/12 Section 2
2. Rediet Ferew -- UGR/1415/12 Section 2
3. Endale Yohannes -- UGR/7379/12 Section 2
4. Tesfaye Adugna -- UGR/4709/12 Section 2
5. Abel Yohannes -- UGR /8254/12 Section 2
5/27/2022 15:05:34 6. BENIYAM ALEMU UGR/4689/12 section 1

Group members
1. Kenna Tefera -- UGR/0317/12 Section 2
2. Rediet Ferew -- UGR/1415/12 Section 2
3. Endale Yohannes -- UGR/7379/12 Section 2
4. Tesfaye Adugna -- UGR/4709/12 Section 2
5. Abel Yohannes -- UGR /8254/12 Section 2
5/27/2022 15:06:10 6. BENIYAM ALEMU UGR/4689/12 section 1 Web Security
Samuel Abatneh Section 1 UGR/7229/12,
Sefibeh Tesfa section 1 UGR/2864/12,
5/27/2022 21:30:04 Yabsira Tekuamework section 2 UGR/9192/12 OS Security
1
Project Title

Work on a system/program that reads the contents of an external storage device (CD/USB/External Hard disk),
travers through all the files and list those file that have .inf and .exe files , change their .txt or other to lessen its maliciousness

Write a simple program/App that runs well but has a BoF vulnerability. Write another program that could be able to attack thi

Develop a simple website/web app that authenticate users and use client site cookies to maintain web sessions without any en
Find a way to hack / eavesdrop the cookies and substitute their contents with contents to allow you get unauthorized accesss t

Write an application that takes students details and stores it in a SQL database. The application should have an String Injectio
SQL Injection. Enter a simple SQL query like "select * from userData where firstName="Yared" on a text box that takes firstN
stored in the database about the user named "YARED". You can also use the SQL command Select * From userNam
Develop a simple forum website that allow users to discuss issues, post ideas, and comment on it. Demonstrate how Stroed XS
content that could cause another user to load an undesirable page or content when the message is viewd or accessed.

Develop a web application that accepts username and password of several users to access its dashboard.
The application must also contain a keylogger that record key strokes and send it to another application. This application will b
and other information entered by the users. What should be done to stop the keylogger application stop sending information in

Develop a web application and demonstrate how Remote-File inclusion attack works on that web application.
What things should be changed to avoid the attack (demonstrate)
Develop a web application and demonstrate how session Hijacking works on that web application.
What things should be changed to avoid the attack (demonstrate)

Work on a system/program that reads the contents of an external storage device (CD/USB/Extern
travers through all the files and list those file that have .inf and .exe files , change their .txt or other to less

Write a simple program/App that runs well but has a BoF vulnerability. Write another program that could be able to attack thi

Develop a simple website/web app that authenticate users and use client site cookies to maintain web sessions without any en
Find a way to hack / eavesdrop the cookies and substitute their contents with contents to allow you get unauthorized accesss t
Write an application that takes students details and stores it in a SQL database. The application should have an String Injectio
SQL Injection. Enter a simple SQL query like "select * from userData where firstName="Yared" on a text box that takes firstN
stored in the database about the user named "YARED". You can also use the SQL command Select * From userNam

Develop a simple forum website that allow users to discuss issues, post ideas, and comment on it. Demonstrate how Stroed XS
content that could cause another user to load an undesirable page or content when the message is viewd or accessed.

Develop a web application that accepts username and password of several users to access its dashboard.
The application must also contain a keylogger that record key strokes and send it to another application. This application will b
and other information entered by the users. What should be done to stop the keylogger application stop sending information in
Write a documentation on 5 of the below-listed malware:

--> Your report of the virus/worm should be technical. Include a back story/ a history of attacks with the malware
– how serious were the attacks?
– Were the creators/authors identified? Did they get Punished for their actions? When was the malware launched?
What was the payload (very important)?
What were/are the specific ways by which the virus/malware spreads?
What systems/applications/OS/Web etc are vulnerable to infection?
What kind of damage does the malware cause to computers and networks?
How widespread was the damage when it was launched?
What preventative measures can one take to avoid being infected?
If one becomes infected, what measures should one take to recover from the compromise?
Any other interesting facts?
List

Sircam
Christma Exec
Bagle
Trojan Horse Sendmail Distribution
MyDoom
Blaster
sobig F
Slammer
Santy
Code Red
Omega Bomb

You might also like