Cybersecurity Projects

Group Ordering in Microsoft’s Kerberos

Kerberos (KRB) is an AAA (authentication, authorization, accounting) protocol
that is predominantly used in Microsoft’s Active Directory environments. It uses a
token system called Tickets, which are granted to entities so they can later use to
authenticate to services. Because of KRB’s vulnerable position in a lucrative target
for hackers, there are many vulnerabilities and attacks to be wary of. One such
attack is ticket forgery, where a hacker can make their own tickets to authenticate
where and when they want. One way to detect a forged ticket is by examining the
order of the groups the entity is a member of and find anomalies.
In this project, you will find the algorithm Microsoft uses to order groups, and write your own ticket forgery tool.

Hacking VR Applications

Virtual Reality (VR) is the concept if immersion of a person in a virtual world, usually with specialized tools, like a headset. Many people these days see VR as a future prospect, with life slowly moving into a virtual world. Whether it is true or not, does not matter; as long as VR becomes more common and is used more for everyday life, malicious actor would seek to exploit it. Application made for VR are still in their infancy, which means that extensive vulnerability research was not conducted. Although research is ramping up, there is still so much work to do. In this project, you will research potential vulnerabilities in VR applications, apply various tool sets and types of hacking, including breadth and depth research.