Professional Documents
Culture Documents
Final Group Project For Cyber Security
Final Group Project For Cyber Security
All section 2
1. Kenna Tefera -- UGR/0317/12
2. Rediet Ferew -- UGR/1415/12
3. Endale Yohannes -- UGR/7379/12
4. Tesfaye Adugna -- UGR/4709/12
5/27/2022 11:45:21 5. Abel Yohannes -- UGR /8254/12 OS Security
1. Betel Tagesse……..……UGR/5409/12
2. Feven Belay ……………..UGR/3979/12
3. Feven Tolla……………….UGR/4493/12
4. Mekdes Kebede………..UGR/3127/12
5. Tigist Zelalem……………UGR/1852/12
5/27/2022 11:50:02 6. Tigist Wondimneh…….UGR/2538/12
Application Security
Dagem Tadesse - UGR/7445/12 section 03
Helawit Abraham - UGR/2966/12 section 03
Naomi Timoteos - UGR/7593/12 section 02
Nazrawi Demeke - UGR/1209/12 section 02
Shalom Girma - UGR/0528/12 section 02
Tsega Yakob - UGR/8465/12 section 02
5/27/2022 12:08:10 Yeabsra Leulseged - UGR/6049/12 section 03
Web Security
NAME SECTION ID
1,Seblewongel Girmaw ............section 3..........UGR/5682/12
2,Kidus Sintayehu .....................section3..........UGR/8503/12
3, Degsew Abebaw....................section1........ UGR/1341/12
4,Fenet Shewarega ...................section1....... UGR/9003/12
5, Dagim Fikru............................section2......... UGR/4328/12
6,Melat Mesele..........................section1........... UGR/9429/12
5/27/2022 12:40:57
BRUK TEDLA TAFESSE UGR/8396/12 SECTION 1
ABDULAZIZ ALI UGR/5744/12 SECTION 1
HAILEMARIAM AREGA UGR/7412/12 SECTION 3
BIRUK TASSEW UGR/2004/12 SECTION 3
5/27/2022 12:50:13 BIRUK ANLEY UGR/3923/12 SECTION 1
1.Abdulkarim Getachew-1-UGR/7992/12
2.Bereket Asnake-3-UGR/9574/12
3.Hailemariam Kefale-3-UGR/0652/12
4.Petros Beyene-1-UGR/1308/12
5.Surafel Getahun-2-UGR/5965/12
5/27/2022 13:03:57 6.Teshome Nbret-2-UGR/3281/12
Bethlehem Alula—UGR/0462/12–sec 2
Name: ID Section
1. Naol Aklilu UGR/0207/12 2
2. Muluken Hakim UGR/1110/12 1
3. Gizaw Agodo UGR/8917/12 1
4. Addisu Motora UGR/4230/12 1
5. Usmael Abdurahman UGR/6575/12 2
5/27/2022 13:23:58 6. Abinet Anamo UGR/7110/12 1
Name Id Section
1. Segni Desalegn UGR/8961/12 3
2. Amha Kindu UGR/8415/12 1
3. Kaleab Kindu UGR/8121/12 2
4. Gadisa Amenu UGR/8440/12 2
5. Habtamu Tsegaye UGR/7096/12 3
5/27/2022 13:43:46 6. Hayat Ebrahim UGR/1897/12 1 Web Security
Group members
1. Kenna Tefera -- UGR/0317/12 Section 2
2. Rediet Ferew -- UGR/1415/12 Section 2
3. Endale Yohannes -- UGR/7379/12 Section 2
4. Tesfaye Adugna -- UGR/4709/12 Section 2
5. Abel Yohannes -- UGR /8254/12 Section 2
5/27/2022 15:05:34 6. BENIYAM ALEMU UGR/4689/12 section 1
Group members
1. Kenna Tefera -- UGR/0317/12 Section 2
2. Rediet Ferew -- UGR/1415/12 Section 2
3. Endale Yohannes -- UGR/7379/12 Section 2
4. Tesfaye Adugna -- UGR/4709/12 Section 2
5. Abel Yohannes -- UGR /8254/12 Section 2
5/27/2022 15:06:10 6. BENIYAM ALEMU UGR/4689/12 section 1 Web Security
Samuel Abatneh Section 1 UGR/7229/12,
Sefibeh Tesfa section 1 UGR/2864/12,
5/27/2022 21:30:04 Yabsira Tekuamework section 2 UGR/9192/12 OS Security
1
Project Title
Work on a system/program that reads the contents of an external storage device (CD/USB/External Hard disk),
travers through all the files and list those file that have .inf and .exe files , change their .txt or other to lessen its maliciousness
Write a simple program/App that runs well but has a BoF vulnerability. Write another program that could be able to attack thi
Develop a simple website/web app that authenticate users and use client site cookies to maintain web sessions without any en
Find a way to hack / eavesdrop the cookies and substitute their contents with contents to allow you get unauthorized accesss t
Write an application that takes students details and stores it in a SQL database. The application should have an String Injectio
SQL Injection. Enter a simple SQL query like "select * from userData where firstName="Yared" on a text box that takes firstN
stored in the database about the user named "YARED". You can also use the SQL command Select * From userNam
Develop a simple forum website that allow users to discuss issues, post ideas, and comment on it. Demonstrate how Stroed XS
content that could cause another user to load an undesirable page or content when the message is viewd or accessed.
Develop a web application that accepts username and password of several users to access its dashboard.
The application must also contain a keylogger that record key strokes and send it to another application. This application will b
and other information entered by the users. What should be done to stop the keylogger application stop sending information in
Develop a web application and demonstrate how Remote-File inclusion attack works on that web application.
What things should be changed to avoid the attack (demonstrate)
Develop a web application and demonstrate how session Hijacking works on that web application.
What things should be changed to avoid the attack (demonstrate)
Work on a system/program that reads the contents of an external storage device (CD/USB/Extern
travers through all the files and list those file that have .inf and .exe files , change their .txt or other to less
Write a simple program/App that runs well but has a BoF vulnerability. Write another program that could be able to attack thi
Develop a simple website/web app that authenticate users and use client site cookies to maintain web sessions without any en
Find a way to hack / eavesdrop the cookies and substitute their contents with contents to allow you get unauthorized accesss t
Write an application that takes students details and stores it in a SQL database. The application should have an String Injectio
SQL Injection. Enter a simple SQL query like "select * from userData where firstName="Yared" on a text box that takes firstN
stored in the database about the user named "YARED". You can also use the SQL command Select * From userNam
Develop a simple forum website that allow users to discuss issues, post ideas, and comment on it. Demonstrate how Stroed XS
content that could cause another user to load an undesirable page or content when the message is viewd or accessed.
Develop a web application that accepts username and password of several users to access its dashboard.
The application must also contain a keylogger that record key strokes and send it to another application. This application will b
and other information entered by the users. What should be done to stop the keylogger application stop sending information in
Write a documentation on 5 of the below-listed malware:
--> Your report of the virus/worm should be technical. Include a back story/ a history of attacks with the malware
– how serious were the attacks?
– Were the creators/authors identified? Did they get Punished for their actions? When was the malware launched?
What was the payload (very important)?
What were/are the specific ways by which the virus/malware spreads?
What systems/applications/OS/Web etc are vulnerable to infection?
What kind of damage does the malware cause to computers and networks?
How widespread was the damage when it was launched?
What preventative measures can one take to avoid being infected?
If one becomes infected, what measures should one take to recover from the compromise?
Any other interesting facts?
List
Sircam
Christma Exec
Bagle
Trojan Horse Sendmail Distribution
MyDoom
Blaster
sobig F
Slammer
Santy
Code Red
Omega Bomb