Security Project

Presenting Security Threats Today.
Preparing You for Tomorrow.

Presentation Roadmap

  • Hypothesis

    Create a starting point.
  • Attacks

    Detail attack types.
  • Myths

    Specify the myths to bust.
  • Tests

    Demonstrate attacks & outcomes.
  • Discoveries

    Present findings & alternatives.
  • Conclusion

    Determine myth or fact.

Type of Attacks

DDoS, Keystroke Injection , and DeAuth.

  • Distributed Denial of Service

    A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. It overloads the server with fake packets so real users cannot access the resource.

  • Rubber Ducky Keystoke Injection

    A Keystroke Injection Attack Tool ("Rubber Ducky") is a specially designed USB device, often disguised as a thumb drive, that automatically runs code on any host computer into which it is plugged.

  • Deauthorization Attack

    A Deauthorization Attack is a Denial of Service attack that disrupts communication between a user and wireless access point. It exploits management frames that are normally used to maintain the link between the two devices.

Demonstration of Attacks

Files on Github.


Closing Remarks.

There are only two kinds of companies:

  1. Those that have been hacked.
  2. Those that will be.

~ Robert Mueller

Brandon Rowe, Kyle Batson, and Josh Howard.