Linux Systems and Kodi Vulnerabilities Assignment

Added on - 20 Sep 2019

  • 9

    Pages

  • 2011

    Words

  • 174

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 3 of 9 pages
Table of ContentsIntroduction........................................................................................................................3Aim.........................................................................................................................................3Objectives............................................................................................................................3Ethical Statement..............................................................................................................3Intellectual Challenge......................................................................................................3Deliverables........................................................................................................................4Resources.............................................................................................................................4Research Approach...........................................................................................................5Qualitative Research...............................................................................................................5Quantitative Research.............................................................................................................5Data Collection Approach...............................................................................................6Static Data Collection...............................................................................................................6Information Gathering data...............................................................................................................6Vulnerability Analysis data................................................................................................................6Live Data Collection.................................................................................................................6Historical data...........................................................................................................................7Limitations and Potential Problems...................................................................................8Prioritization...........................................................................................................................................8Programming..........................................................................................................................................8Kodi Platform..........................................................................................................................................8Literature Review.............................................................................................................8Conclusion...........................................................................................................................8Appendix A..........................................................................................................................9Disclaimer Form..........................................................................................................................................9
IntroductionIn this project vulnerabilities of an open source media center based onembedded Linux system will be checked and solution will be installed to preventexploiting those vulnerabilities. The open source media center in this case will beKodi.Kodi provide set of add-ons that allow users to download services like YouTube,drop box, Internet explorer etc. any updates for these services are downloadedvia unsecure http connection, which leaves it open for attacks like man in themiddle. There are also different repositories available to download contentsfrom.Although Linux has less reported vulnerabilities than windows however one ofthe reason is its low desktop usage as compared to Windows environment. Linuxhas reported vulnerabilities in areas like buffer overflow, memorymismanagement that can result in memory corruption, denial of service.AimThe aim of this project is to identify vulnerabilities in embedded Linux systemand Kodi. Once identified a solution will be installed to make it secure. Thissolution will include a script or program to first run penetration testingprograms to identify vulnerabilities and then install solution.ObjectivesDiscuss embedded Linux Operating System and Kodi.Identify possible vulnerabilities in Linux and Kodi.Examine exploits related to vulnerabilities.Determine possible solutions for the exploits/vulnerabilities.Write a script or program to determine vulnerabilities and apply solutions.Carry out evaluation of the artifact.Carry out evaluation of the project as a whole.Ethical StatementPlease see Appendix A for Ethical Statement.Intellectual ChallengeEmbedded Linux is now days used in a variety of devices and to many people it isnear to impossible that these devices can be exploited by taking advantage ofweakness in operating system. There are areas where it can be exploited if notlook after easily. Examples are outdated software, not having up to date patch.
Sniffers can be used to access remote Linux operating system, buffer overflowcan be created which results in giving privileged access to attacker.On top of Embedded Linux there are variety of program runs, ranges robotics toopen source media center like Kodi. Kodi allows third party developers tocreated their own add-ons, which can be downloaded by end users, whendownloading these add-ons, or updating them it can give full access to thesystem, which will make it open for exploitation. Also it use http to transfer filesor update and it’s not clear how secure it is. Most kodi devices have wirelesscards, which can also be exploited to gain access to local network resources.This project will help in making sure how these can be made more secure.DeliverablesProject Plan.Literature review of Linux and Kodi.Analysis of Vulnerabilities in Linux and Kodi.Documentation of Exploits based on step 3.Proof of conceptTest script for bugs/code errors.Analysis of test results.ResourcesHardwareUSB CablesNetwork cablesKodi BoxLaptopADSL RouterPower cablesSoftwareKali Linux Operating SystemKodi Media CenterMicrosoft OfficeOthersLibrary ResourcesProject Supervisor
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document