Ask a question from expert

Ask now

Research Methodology and Practice

9 Pages2011 Words226 Views
   

Added on  2019-09-20

About This Document

Introduction 3 Aim3 Objectives 3 Ethical Statement3 Intellectual Challenge 3 Deliverables 4 Resources4 Research Approach5 Qualitative Research 5 Quantitative Research5 Data Collection Approach 6 Static Data Collection 6 Information Gathering data 6 Vulnerability Analysis data6 Kernel Live Data Collection 6 Historical data7 Limitations and Potential Problems.8 Prioritization 8 Programming8 Kodi Platform 8 Literature Review8 Conclusion 8 Appendix A 9 Disclaimer Form9 Introduction In this project vulnerabilities of an open source media center based on embedded Linux system will be checked and solution will be

Research Methodology and Practice

   Added on 2019-09-20

BookmarkShareRelated Documents
Table of ContentsIntroduction........................................................................................................................3Aim.........................................................................................................................................3Objectives............................................................................................................................3Ethical Statement..............................................................................................................3Intellectual Challenge......................................................................................................3Deliverables........................................................................................................................4Resources.............................................................................................................................4Research Approach...........................................................................................................5Qualitative Research...............................................................................................................5Quantitative Research.............................................................................................................5Data Collection Approach...............................................................................................6Static Data Collection...............................................................................................................6Information Gathering data...............................................................................................................6Vulnerability Analysis data................................................................................................................6Live Data Collection.................................................................................................................6Historical data...........................................................................................................................7Limitations and Potential Problems...................................................................................8Prioritization...........................................................................................................................................8Programming..........................................................................................................................................8Kodi Platform..........................................................................................................................................8Literature Review.............................................................................................................8Conclusion...........................................................................................................................8Appendix A..........................................................................................................................9Disclaimer Form..........................................................................................................................................9
Research Methodology and Practice_1
IntroductionIn this project vulnerabilities of an open source media center based onembedded Linux system will be checked and solution will be installed to preventexploiting those vulnerabilities. The open source media center in this case will beKodi.Kodi provide set of add-ons that allow users to download services like YouTube,drop box, Internet explorer etc. any updates for these services are downloadedvia unsecure http connection, which leaves it open for attacks like man in themiddle. There are also different repositories available to download contentsfrom.Although Linux has less reported vulnerabilities than windows however one ofthe reason is its low desktop usage as compared to Windows environment. Linuxhas reported vulnerabilities in areas like buffer overflow, memorymismanagement that can result in memory corruption, denial of service.AimThe aim of this project is to identify vulnerabilities in embedded Linux systemand Kodi. Once identified a solution will be installed to make it secure. Thissolution will include a script or program to first run penetration testingprograms to identify vulnerabilities and then install solution.ObjectivesDiscuss embedded Linux Operating System and Kodi.Identify possible vulnerabilities in Linux and Kodi.Examine exploits related to vulnerabilities.Determine possible solutions for the exploits/vulnerabilities.Write a script or program to determine vulnerabilities and apply solutions.Carry out evaluation of the artifact. Carry out evaluation of the project as a whole.Ethical StatementPlease see Appendix A for Ethical Statement. Intellectual ChallengeEmbedded Linux is now days used in a variety of devices and to many people it isnear to impossible that these devices can be exploited by taking advantage ofweakness in operating system. There are areas where it can be exploited if notlook after easily. Examples are outdated software, not having up to date patch.
Research Methodology and Practice_2
Sniffers can be used to access remote Linux operating system, buffer overflowcan be created which results in giving privileged access to attacker.On top of Embedded Linux there are variety of program runs, ranges robotics toopen source media center like Kodi. Kodi allows third party developers tocreated their own add-ons, which can be downloaded by end users, whendownloading these add-ons, or updating them it can give full access to thesystem, which will make it open for exploitation. Also it use http to transfer filesor update and it’s not clear how secure it is. Most kodi devices have wirelesscards, which can also be exploited to gain access to local network resources. This project will help in making sure how these can be made more secure. DeliverablesProject Plan.Literature review of Linux and Kodi.Analysis of Vulnerabilities in Linux and Kodi.Documentation of Exploits based on step 3.Proof of conceptTest script for bugs/code errors.Analysis of test results.ResourcesHardwareUSB CablesNetwork cablesKodi BoxLaptopADSL RouterPower cablesSoftwareKali Linux Operating SystemKodi Media CenterMicrosoft OfficeOthersLibrary ResourcesProject Supervisor
Research Methodology and Practice_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
INFORMATION SYSTEM THREATS, ATTACKS AND DEFENSES.
|29
|1680
|33

Network Vulnerability And Cyber Security
|15
|1453
|15

Securing Linux Based OS: A Stepwise Guide to Harden Ubuntu 16.04 LTS Server
|20
|2197
|262

Exploiting the Eternal Blue Vulnerability (CVE-2017-0144) in SMB
|8
|1879
|487

Computer Security Assignment Solved
|10
|2742
|144

Microsoft Data Access Components Vulnerability Report
|5
|801
|430