A carregar...
2 resultados
Resultados da pesquisa
A mostrar 1 - 2 de 2
- Forensic Analysis of the Bumble Dating App for AndroidPublication . Barros, António; Almeida, Rafaela; Melo, Tiézer; Frade, MiguelMobile applications that facilitate interaction between people have grown in popularity and, as a result, the number of e-dating applications have expanded. In these types of applications, there is usually a trade-off between user privacy and safety. On one hand, users want to keep their data as private as possible, on the other hand, user identification forces accountability, which, hopefully, will foster the development of responsible behaviors and minimize abuses. The Bumble e-dating app has been growing in popularity and differs from other apps by giving women the power to make the first contact after a match. Their main goal is to prevent women’s harassment. In this work, we study the digital artifacts that can be found after the use of the Bumble app on Android devices. Despite applying many measures to ensure data protection, it was possible to obtain information that identifies users and exchanged messages. The data structure stored on the device is described, as well as the artifacts with forensic value for an investigation. Moreover, a script was created to parse and visualize the main forensic artifacts of the Bumble app.
- An easy-to-use tool to inject DoS and spoofing networking attacksPublication . Almeida, Rafaela; Pacheco, Vasco; Antunes, Mário; Frazão, LuísComputer network attacks are vast and negatively impact the infrastructure and its applicational services. From a cyber offensive and defensive perspective, there are a plethora of tools to craft and inject customized malicious packets in the network and exploit operating systems and application vulnerabilities. Those tools are however hard to operate by practitioners with less knowledge on networking fundamentals and students in the early stage of their studies. This paper proposes an easy-to-use application tool that can produce customized Denial of Service (DoS) and spoofing attacks. It was developed in Python and takes advantage of scapy library to process and inject network packets. A set of experiments was made, and the results obtained show the efficiency and accuracy of the attacks, by impairing the proper functioning of the victim's machines.
