The attack is based on a 3-step methodology that can be fully automated in order to deploy massive attacks against vulnerable systems. The methodology takes advantage of the “Google Hacking” technique and extends it with two more steps that of information manipulation and the deployment of an exploit. Specially crafted implementations of the proposed attack methodology can be used per se to prevent cyber crime operations through the identification of vulnerable systems and prevention of massive cyber attacks against vulnerable systems.
Category Archives: Activities
An effective attack method based on information exposed by search engines
Cassiopeia: Real-time mobile security monitoring system
Cassiopeia aims to improve the conditions of supervision and control of the system security administrators, and reduce critical incidents response time. To achieve this Cassiopeia provides a convenient mobile system architecture with flexible and easily extensible design. The proposed architecture supports real-time system monitoring and threat identification. Additionally, a visual representation of the monitored system’s status and activity is used to provide an abstracted overview. The system status and activity information are provided to the end user through a mobile application. This end user application is presented below:
Artemis: application designed to protect minors
Artemis is an innovative application designed to protect minors from malicious sexual exploitation attempts. Artemis analyzes the content of incoming messages (sms) on mobile phones running the Android operating system and sends an alert message whenever inappropriate content is detected. So far, Artemis supports ONLY English.
Download here!
Please read carefully the license terms and conditions before installing and
using the application. Charges may apply depending on your carrier.
Feel free to send us feedback about bugs and potential improvements.
CrypTool greek translation
Members of student group Ιnfosec of University of Macedonia, in cooperation with the developers of CrypTool, are currently working on developing the greek version of Cryptool.
The project aims at providing a successful development of the greek version that will be available on the official website of Cryptool.
So far, our team has undertaken the greek localization of:
- CrypTool Wiki [url]
- CrypTool 1.4 [url]
- CrypTool 2.0 [url]
- JCrypTool 1.0 [url]
- CrypTool Online [url]
- CrypTool Mobile [url]
If yoυ want to participate in the project please contact us.
Cyber Defense Exercises
The team members took part in the following Cyber Defense exercises:
- 2nd National Cyber Defense Exercise – Greece (Panoptis 2011), 31 Οctober – 4 Νοvember 2011
- NATO Cyber Defence Exercise 2010 (NCDEX 2010) Cyber Coalition, 16 – 19 November 2010
- 1st National Cyber Defense Exercise – Greece (Panoptis 2010), 18 – 20 May 2010
Research and development projects
The team members are participating in the following research and development projects:
- Module C: INFRASTRUCTURE SERVICES, MANAGEMENT, INFORMATION AND OPERATION OF ELECTRONIC IDENTITY AT THE UNIVERSITY OF MACEDONIA “Priority” 04 – Digital convergence and entrepreneurship, “Macedonia – Thrace”, co-financed by the European Regional Development Fund.
- Module B2: ACADEMIC CONTENT TO OPEN ACCESS AT THE UNIVERSITY OF MACEDONIA: SERVICES ORGANIZATION, PROMOTION, AND ADOPTION OF INTERCONNECTION “Priority” 04 – Digital convergence and entrepreneurship, “Macedonia – Thrace”, co-financed by the European Regional Development Fund.