The objective of this activity is to simulate and existing vulnerability (it can be an application, network, etc.) and create an analysis based on research. The ultimate goal is for the students to come up with an outlook of the vulnerability on how it has affected and will affect the computing world in the future.
For instance, there Vulnerability X works on Platform Y.1. Computers need to update to Platform Y.2 to become protected. However, a lot of computers didn’t update because of compatibility issues. What will happen to these “unpatched computers?” How many of them are found in critical data centers etc? Will Vulnerability X evolve into a more complex and more dangerous vulnerability?
Android Rooting Vulnerability – Android Rooting
iOs Jailbreak Vulnerability – iOS Jailbreak
Heartbleed Vulnerability – Heartbleed
Shellshock Vulnerability – Shellshock Vulnerability
Remote Desktop Protocol Vulnerability – RDP
Adobe Flash Vulnerability – Adobe Flash