Comprehensive Risk Rating System (CRRS): Vulnerability vs Impact Certain - 5 Likely - 4 Possible - 3 Unlikely - 2 Rare - 1 Assets and Potential Risk Factors Vulnerability Minor Marginal Critical Catastrophic Hubs and Switches Likely Medium - 7 High - 8 High - 8 Very High - 9 Application…
R. KarthikVimal
updated on 16 Sep 2023
Project Details
Leave a comment
Thanks for choosing to leave a comment. Please keep in mind that all the comments are moderated as per our comment policy, and your email will not be published for privacy reasons. Please leave a personal & meaningful conversation.
Other comments...
Read more Projects by R. KarthikVimal (6)
Project - Paradigm of Building Cyber-ops team from Square one
1. Disk Cleanup can help free up space on the disk, including deleting of the temporary files, emptying the Recycle Bin and removal of unused programs. User can free up disk space and maintain system properties by running Disk Cleanup on a regular basis. User can improve the performance of Disk Defragmenter by…
16 Sep 2023 08:16 AM IST
Project 2 - Installing BWAPP – web app on your local machine
1. Cross-Site Scripting - Stored (Blog): Insecure DOR (Change Secret) – Create 2 users. Login as user A and try to change the password (secret) of user B. Created 2 users: USER_A and USER_B Next step, have changed the login=USER_B in the request and forwarded to change the secret=new secure secret Cross-Site…
16 Sep 2023 08:15 AM IST
Project 1 - Design Enterprise Security Model
Security design/model for the bank’s infrastructure/assets and a security checklist for this design: The submitted attachment shows the bank's network security through which the employees access the internet and other features enabled to restrict any external agents. The checklist provides the insights about the…
16 Sep 2023 08:15 AM IST
Project 1 - Setting up Virtual Machine
1. IP Address of attacker and victim machines are shown: Attacker machine: Victim machine: 2. MSFvenom Payload Creator (MSFPC) is a user-friendly multiple payload generator that can be used to generate Metasploit payloads based on user-selected options. 3. Attacker machine, in kali linux using netcat command…
16 Sep 2023 08:13 AM IST
Project 2 - Comprehensive Risk Rating System (CRRS)
Comprehensive Risk Rating System (CRRS): Vulnerability vs Impact Certain - 5 Likely - 4 Possible - 3 Unlikely - 2 Rare - 1 Assets and Potential Risk Factors Vulnerability Minor Marginal Critical Catastrophic Hubs and Switches Likely Medium - 7 High - 8 High - 8 Very High - 9 Application…
16 Sep 2023 08:13 AM IST
Project 1
A program that logs CAN data from one or more CAN buses: This program uses the candump command to read CAN data, then sorts the messages into even and odd logs based on their ARB ID. It creates new log files for each type of message if the current log file has reached its maximum capacity of 1000 messages.
16 Sep 2023 08:12 AM IST