Category: Cyber Security

  • How does cybersecurity threats affect mental health?

    how does cybersecurity affect mental health?

  • i have 2 small labs i need help with them regarding digital…

    the question will be inside the word file i added templete i want photo of the steps in the report of the labs

  • FluxArchiv Reverse Engineering Analysis

    Assignment Overview

    This assignment requires performing static and dynamic reverse engineering on the FluxArchiv application in order to identify how it validates and obfuscates passwords. By analyzing the executable and the archive file, the goal is to extract the hidden key and ultimately recover the real password using a brute-force approach.

    Detailed Explanation

    In this assignment, the objective is to reverse engineer the archiv executable on a Linux system to understand how it processes and validates passwords against the FluxArchiv.arc file. The process begins by running the program normally (./archiv) to observe its help output and understand the expected command-line arguments.

    Next, static analysis is performed using Ghidra. By importing the archiv binary into Ghidra, the programs structure, function flow, and password validation logic can be examined. Special attention is given to functions related to file reading, string comparison, and any obfuscation or shuffle logic applied to the user-provided password.

    The FluxArchiv.arc data file is then analyzed using Linux utilities. The file command is used to identify the file type, while hexdump -C -n 50 is used to inspect the first 50 bytes of the file in both hexadecimal and ASCII formats. This step helps identify the file header, version information, and potential key data stored within the archive.

    Dynamic analysis is performed using strace and ltrace.

    • strace is used to monitor system calls such as open, read, and lseek, allowing observation of which file offsets and byte lengths are read during password validation.
    • ltrace is used to monitor library function calls such as fopen, fread, memcmp, and strcmp, revealing how the program compares user input against data read from the archive file.

    Using information gathered from the hexdump and tracing tools, Ghidra is revisited to correlate the observed behavior with the underlying code. This makes it possible to identify the exact locations of the archive header and the embedded key, as well as the obfuscation algorithm used to transform the input password before validation.

    Once the key is extracted from the archive file, the provided Python 2.7 brute-force script (FLUXACRCHIV-BruteForce.py) is modified by replacing the placeholder string "STODO-KEY" with the extracted key. The script is then executed with a specified permutation count (e.g., python FLUXACRCHIV-BruteForce.py 15). When a permuted password matches the shuffled key, the script reveals the real password.

    By following these steps, the assignment demonstrates practical skills in Linux-based reverse engineering, static and dynamic analysis, and basic cryptographic obfuscation reversal.

  • IT-474: Introduction to Cyber Security

    I have a short discussion which is a question and I want to answer it, and it is also required in the same file that I write a short reply to the answers of 2 friends. I want to note that copying is not allowed at all because if any similarity is found, the grade will be recorded as zero by the professor.

    Requirements: As required

  • Web Attack Report

    Continue your work for a cybersecurity company that offers a full range of forensic tools and services. Your boss has asked you to make a presentation to a new prospective client. The prospective client is a large conglomerate that owns companies in 3 industries: retail, technology, and entertainment. Your boss wants you to research and present 1 to 2 major web attacks and how your organization can help find attacks that could be occurring to the organization now and also to help the prospective client avoid future attacks as well.

    Create an 8- to 15-slide presentation that includes speaker notes on web attacks on companies in the retail, technology, or entertainment industries. The presentation should stress the essential role of forensic investigators in the analysis of web attacks in an effort to understand them and find ways to prevent them in the future. Complete the following in your presentation:

    • Describe how the web attack infiltrated the organization.
    • Discuss the impact of the attack on the organization that was attacked.
    • Describe how the attack was identified, including the digital indications of the web attack.
    • Discuss what forensic investigations discovered about the attack, including any tools or techniques the investigators used. If possible, include the steps taken in the web attack investigation.
    • Discuss recommendations for the prospective client to avoid being susceptible to this attack in the future.
    • List services forensic investigators and penetration testers can provide to reduce the risk of attacks to the potential customer.

    Cite any references to support your assignment.

    Format your assignment according to APA guidelines.

    Submit your assignment.

    Requirements: 8-15 slides

  • Cyber Security Question

    Scenario:

    You are the Information Security Manager for a medium-sized retail organization based in Riyadh. Organizational success is based on your customers being able to purchase items securely through the companys website. Employees regularly make purchases without following company procedures.

    You have been asked to assess if there are any company vulnerabilities that may impact purchases and come up with security recommendations that may minimize any website risks, threats, and vulnerabilities.

    Directions:

    Write a paper that includes the following:

    • A description of three major risks, three threats, and three vulnerabilities that are of web hacking concerns for any security professional.
    • Compare and contrast best practices you would recommend to mitigate these web application risks, threats, and vulnerabilities.

    Keep in mind; your assessment is being assessed on your ability to describe current risks, threats, and vulnerabilities in the retail industry in accordance with security goals. Use diagrams, where appropriate.

    Deliverables:

    • Your paper should be 45 pages in length, not including the title and reference pages.
    • You must include a minimum of two credible sources and information from the module to support your writing.
    • use APA (American Psychological Association) 7th edition guidelines for formatting

    Requirements: Javascript

  • Project – Pre-Work Reflection

    Project – Pre-Work Reflection

    1 – Show proof that you have acquired all tools needed to complete Phase 1 of the project. You may use screenshots or other verifiable means.

    2 – Break Phase 1 into smaller tasks. Provide a time estimate for each task. Each task should be 2 hours or less, and the total task time should be 8 hours 12 hours.

    3 – Create a schedule you intend to follow to complete Phase 1. Phase 1 should be about a week’s worth of work, and the schedule should show a day and time that each task will be worked on.

    4 – Write a reflection essay of 250 – 350 words (about half a page). The reflection should answer the prompt “What are the importance of the Phase 1 tasks. This reflection should include a paragraph with several supporting reasons regarding which task will be the most difficult. Include a separate paragraph with several supporting reasons regarding which task will be most critical to future Phases. The opening paragraph should summarize what will be communicated in the rest of the reflection.

    Fill out the “Completed Assignment” section of the OneNote notebook that you created in a previous unit. You can refer to the sample in the OneNote for an idea on how a completed section will look.

    Turn in a publicly available View Only link to your OneNote notebook.

    , and don’t forget to test in an Incognito tab.

    Requirements: 250 – 350 words (about half a page)

  • What is the difference between ethical hacking and malicious…

    Ethical hacking is legal hacking done with permission to improve security, while malicious hacking is illegal hacking done without permission to steal, damage, or misuse data.

    Requirements: