COMSEC2 Vulnerability POC and Analysis

For COMSEC2, the project of the students is to simulate and existing vulnerability (it can be application, network etc.) and create an analysis based from research. The ultimate goal is for the students to come up with an outlook of the vulnerability on how it has affected and will affect the computing world in the future.

For instance, there Vulnerability X works on Platform Y.1. Computers need to update to Platform Y.2 to become protected. However, a lot of computers didn’t update because of compatibility issues. What will happen to these “unpatched computers?” How many of them are found in critical data centers etc. Will Vulnerability X evolve into a more complex and more dangerous vulnerability?

Sample works:

Android Rooting Vulnerability – Android Rooting

iOs Jailbreak Vulnerability – iOS Jailbreak

Heartbleed Vulnerability – Heartbleed

Shellshock Vulnerability – Shellshock Vulnerability

Remote Desktop Protocol Vulnerability – RDP

Adobe Flash Vulnerability – Adobe Flash

 

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s