Personal Vulnerability Investigation

How did you spend your hours for the Personal Vulnerability Investigation?

Below you can see the division of these 20 hours between the 5 main activities of this project, along with brief explanations of each one. More detailed information is available in this word document about the Personal Vulnerability Investigation and on the Powerpoint presentation i have made.

->Web research: by far the part of the project that lasted the most, web research largely did not prove to be very useful. As it turns out, there is very little relevant information on the internet, mainly due to the sensitivity of the information. This topic is not very well covered on the web pages in order to prevent malicious attacks.

->Choosing a device: this took longer than expected mainly because i have changed my mind along the way. After consulting the teachers and the list of possible devices from Canvas, i decided to hack into a toy car, but i later switched to one of my old smartphones.

->Bug exploit: After rigurous web research on the matter, i have discovered a Samsung system bug and decided to exploit it. The bug allows the attacker to unlock the phone without typing the password.

->Virus related work: One of the very few actually useful web pages i have found describes the steps needed to create a virus which once installed on the victim's phone can get control of the camera, among other things. I have taken my time trying to get it to work.

->Documentation: This includes the creation of this webpage, along with this word document, containing in-depth information about the Personal Vulnerability Investigation.