Vulnerability Proof-of-Concept and Analysis

The objective of this activity is to simulate and existing vulnerability (it can be an application, network, etc.) and create an analysis based on research. The ultimate goal is for the students to come up with an outlook of the vulnerability on how it has affected and will affect the computing world in the future.

For instance, there Vulnerability X works on Platform Y.1. Computers need to update to Platform Y.2 to become protected. However, a lot of computers didn’t update because of compatibility issues. What will happen to these “unpatched computers?” How many of them are found in critical data centers etc? Will Vulnerability X evolve into a more complex and more dangerous vulnerability?

Sample works:

Android Rooting Vulnerability – Android Rooting

iOs Jailbreak Vulnerability – iOS Jailbreak

Heartbleed Vulnerability – Heartbleed

Shellshock Vulnerability – Shellshock Vulnerability

Remote Desktop Protocol Vulnerability – RDP

Adobe Flash Vulnerability – Adobe Flash

 

 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.