GithubHelp home page GithubHelp logo

Navindu Dulanaka's Projects

eguru icon eguru

EGuru is an Educational project. EGuru provide Past Papers, Model Papers, Notes, Syllabuses and many more for students who study ICT & Engeeniring Technology. Resources based on Sri Lankan G.C.E Advanced Level and Ordinary Level Examination are freely available for the Students to download.

security-drawbacks-in-related-to-bluetooth-technology-in-iot-devices icon security-drawbacks-in-related-to-bluetooth-technology-in-iot-devices

The main component of wireless communication is Bluetooth technology. It provides a low energy and affordable short-range radio solution. It is available in mobile devices, headphones, speakers, medical equipment, and many other devices. Today Bluetooth technology integrated with IoT. In smart homes and companies, the IoT based Bluetooth technology is also available for monitoring and controlling the lighting, thermostats, door lockers, appliances, safety systems and cameras. But Bluetooth does not provide a centralized security infrastructure for ease and convenience. Therefore, there are significant vulnerabilities to safety and the need to be conscious of security risks as technology increases. With this review paper able to know value of understanding the risks of attacks, Vulnerabilities, mitigation techniques and recommendations involved in our devices using Bluetooth technology. Keywords— IoT, Gaussian frequency-shift key, Bluetooth attacks, Bluetooth Mitigation, Piconet, Protocol Stack, Bluetooth security, PIN Cracking attack, BlueBorne; Man in- the-Middle attack, Eavesdropping

zeus_malware_analysis_case_study icon zeus_malware_analysis_case_study

Since 2006, the Zeus Malware has become the most popular banking trojan, infecting tens of millions of machines. The malware is distributed as a toolkit, which allows hackers to modify the source code and create their own variants. Once infected, the Zeus malware can automatically collect passwords from Protected Storage and potentially take control of your computer, downloading files, shutting it down, rebooting, or deleting system files, resulting in your machine crashing. However, hackers frequently use it to monitor selected websites, insert fields that were not there originally, and steal personal information. For instance, in addition to your username and password, you may be asked for your phone number, date of birth, and other personally identifiable information, which could potentially result in account theft. During the attempt to face certain vulnerabilities, In malware investigation, reverse engineering has become a standard technique. Throughout this area, reverse engineering is utilized to understand virus behavior by reproducing and examining the components of the source code. This method has been utilized in Malware Analysis utilizing Static and Dynamic approaches, which both heavily rely on Reverse Engineering techniques. Considering the importance of this issue, this case study will focus on the ZeusVM Version 2.0.0.0 trojan, and a complete version of its Toolkit was released for free on the internet, allowing anybody to construct a Zbot. This study resulted in the discovery of a unique approach for decrypting the URL of the Command & Control Server. Additionally, the function of certain indexes in RC4 decryption was revealed, as was the method utilized to encrypt communication between the Command & Control Server and the client.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.