Advertisement
Help Keep Boards Alive. Support us by going ad free today. See here: https://subscriptions.boards.ie/.
If we do not hit our goal we will be forced to close the site.

Current status: https://keepboardsalive.com/

Annual subs are best for most impact. If you are still undecided on going Ad Free - you can also donate using the Paypal Donate option. All contribution helps. Thank you.
https://www.boards.ie/group/1878-subscribers-forum

Private Group for paid up members of Boards.ie. Join the club.

College project ideas

  • 19-11-2014 06:55PM
    #1
    Registered Users, Registered Users 2 Posts: 2,217 ✭✭✭


    Hi guys,

    I'm a 3rd year Infosec student and looking for some project ideas. The standout option at this point is to setup a Honeypot... probably run Kippo on a Raspberry Pi as kippo has some really nice graphs and analytics stuff built in. That's all well and good... but what would I be analysing? Types of commands being run after an attacker gets in? Region where the most attacks come from?

    Or do you guys think that Honeypots have been done to death for this type of thing? My other idea was to do some research on Tor and some of the possible reasons that the network may have been compromised recently but I am completely open to ideas.


Comments

  • Registered Users, Registered Users 2 Posts: 203 ✭✭industrialhorse


    kyub wrote: »
    Hi guys,

    I'm a 3rd year Infosec student and looking for some project ideas. The standout option at this point is to setup a Honeypot... probably run Kippo on a Raspberry Pi as kippo has some really nice graphs and analytics stuff built in. That's all well and good... but what would I be analysing? Types of commands being run after an attacker gets in? Region where the most attacks come from?

    Or do you guys think that Honeypots have been done to death for this type of thing? My other idea was to do some research on Tor and some of the possible reasons that the network may have been compromised recently but I am completely open to ideas.

    Tor would make a more interesting project than honeypots IMO but how about researching vulnerabilities within encryption technologies as we have already seen the likes of Heartbleed and Poodle have a major affect on SSL encryption software and there may well be more software libraries out there that are as much at risk due to lack of patching or code audit!


  • Closed Accounts Posts: 824 ✭✭✭Kinet1c


    How about research in to poodle/heatbleed vulnerable devices still out there? Given the mainstream attention brought to both of them, there should be no excuse for having vulnerable devices still out there.


  • Registered Users, Registered Users 2 Posts: 2,900 ✭✭✭wandererz


    The suggestion above is a good one.

    ShodanHQ tracks exposed systems - such as exposed SCADA systems.

    http://www.shodanhq.com/help/tour

    Perhaps you could focus on exposed poodle/heatbleed vulnerable devices in Ireland?


  • Registered Users, Registered Users 2 Posts: 2,217 ✭✭✭Kur4mA


    wandererz wrote: »
    The suggestion above is a good one.

    ShodanHQ tracks exposed systems - such as exposed SCADA systems.

    http://www.shodanhq.com/help/tour

    Perhaps you could focus on exposed poodle/heatbleed vulnerable devices in Ireland?

    That is awesome! I'd never heard of Shodan before now but it looks really good. I'll definitely give this a further look for potential projects. After having a quick browse the number of vulnerable systems dotted about the country is a little bit unsettling, but as a student, seeing the lackluster approach a lot of individuals and companies have to InfoSec never ceases to amaze me. :)


  • Registered Users, Registered Users 2 Posts: 7,830 ✭✭✭jmcc


    How about USB based malware detection as a topic?

    Regards...jmcc

    Regards…jmcc



  • Advertisement
  • Registered Users, Registered Users 2 Posts: 52 ✭✭fcerullo


    If interested in web application & mobile security, please ping me... I have some ideas.


  • Registered Users, Registered Users 2 Posts: 2,217 ✭✭✭Kur4mA


    kyub wrote: »
    That is awesome! I'd never heard of Shodan before now but it looks really good. I'll definitely give this a further look for potential projects. After having a quick browse the number of vulnerable systems dotted about the country is a little bit unsettling, but as a student, seeing the lackluster approach a lot of individuals and companies have to InfoSec never ceases to amaze me. :)

    So my project will be a combination of what I initially wanted to do with honeypots, along with Shodan. I'm going to use honeypots to hopefully show that heartbleed/poodle are still very real attack vectors being used on a daily basis and then the Shodan data to show that there are vulnerable systems in Ireland today. Early research confirms that there definitely are vulnerable systems out there.

    I also might use Shodan along with some nmap shenanigans to see if there are any Shellshock vulnerable systems, but not sure on this one yet. Following this, I'll do some research into Information Responsibility, not Security which will be around the reasons why there are still vulnerable systems out there i.e lack of responsibility/lack of education/lack of budget/not giving a crap. :)


Advertisement