Module 52 (Smartphone Pentest Framework)

Size: px
Start display at page:

Download "Module 52 (Smartphone Pentest Framework)"

Transcription

1 (Smartphone Pentest Framework) At the end of this Module, students should understand the purpose of the Smartphone Pentest Framework (SPF). They should understand legal/ethical issues distinguishing smartphone pen testing from other types of pen tests. They should understand how to create and use Android Virtual Device (AVD) emulators using the Android SDK. They should be able to use an AVD(or actual smartphone) as an SPF modem for launching SMS attacks against other smartphones. 1/22

2 Purpose of the Smartphone Pentest Framework Employees use smartphones for their work. Security of smartphones is at risk Remote Vulnerabilities (allow rooting) Client-side Vulnerabilities (browser vulnerabilities) Social Engineering (direct users to pages that exploit vulnerabilities) Local Vulnerabilities (user rootkit or jailbreak) Development was carried out under the DARPA CyberFast program. Goal: make smartphone pen testing easier to do. 2/22

3 Smartphone Special Ethical Legal Issues Do you have permission to hack the device? Get list of phone numbers in scope. Do you have permission to anything you find on the device? Contacts, SMS text, passwords? Is the grantor of the permission legally authorized to give it? What disclosures/disclaimers were given/required of employees? 3/22

4 Architecture Server provides framework functionality from a PC Web server (to exchange information) Mysql database FrameworkAndroidApp.apk can be used to provide (some) functionality from an attached smartphone used as a modem. Vulnerable smartphones are used as targets for the server and framework modem. 4/22

5 The Smart Phones The Smartphone Pentest Framework can be used with actual phones, but that's tricky to demonstrate. Instead of using multiple smartphones, we will use android smartphone emulators and restrict our communications to SMS and Internet (no voice communications. Need to know how to download and install the Android SDK and configure emulators. 5/22

6 Downloading the Android SDK Get the most current version: Google for android sdk Currently get to this page: To run on kali, download linux 32-bit x86 bundle. 6/22

7 Downloading Android SDK 7/22

8 What do I do with the SDK? Unzip it to some reasonable location (perhaps the Desktop) You will likely need to apt-get install libgl1-mesa-swx11 in order to get libgl.so Also, you may need to ln -s /usr/lib/i386-linux-gnu/libgl.so.1 /usr/lib/libgl.so Then you can run the following: cd sdk/tools./android 8/22

9 Configure Android Virtual Devices Select Tools Manage AVDs 9/22

10 Add New AVDs for the Framework Modem and the Vuln Phone Select the New Button 10/22

11 Choose A Device (I'm using 2.2) Increase Storage/Memory/SD Options 11/22

12 Dealing with the Android SDK Manager To list available devices android list To close an Android SDK Manager subwindow Right click on the TitleBar and select Close 12/22

13 Start the Smartphone Pentest Framework Cranky response parsing Use selection 0 for back (even if not listed) 13/22

14 We want to create an Agent inside our Framework Phone Use an Android phone (or emulator) as a modem for you computer to send SMS messages. From main menu in SPA: 4.) Attach Framework to a Mobile Modem 3.) Generate smartphone based app 1.) Android App (Android 1.6) Phone number of agent: All Android Emulators start with Control key for the agent: SPAKEY1 Any seven letter key (security measure) Webserver control path for agent: /control Subdirectory of /var/www This creates FrameworkAndroidApp.apk in the framework console subdirectory of the SPA directory Copy the FrameworkAndroidApp.apk to /var/www for transfer to your modem smartphone. 14/22

15 Download the Framework App to your Modem Smartphone Use the web browser to browse to your control server 15/22

16 Attach or SPF to the Modem From the SPF Main Menu: 4.) Attach Framework to a Mobile Modem 2.) Attach to a smartphone based app Phone Number: Control Key: SPAKEY1 App URL Path: /control On phone, run the Framework App 16/22

17 Enter the Appropriate Information (Order is different) 17/22

18 Mount a Social Engineering Attack In SPF Main Menu: 6.) Run a social engineering or client side attack 1.) Direct Download Agent Deliver Android Agent or Android Meterpreter (Agent/meterpreter:) Agent Platform(Android/iPhone/Blackberry): Android Hosting Path: /agentpath Filename: /coolapp.apk Delivery Method:(SMS or NFC): SMS Phone Number to Attack: Custom text(y/n)? n Select a modem to interact with 18/22

19 Target Phone Receives SMS 19/22

20 Message includes URL to SPF server 20/22

21 And Finally I was unable to get the payloads to function with the AVD versions I was using. 21/22

22 Application Downloads Install/Run 22/22

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking Summer Training Internship Program 2017 (STIP - 2017) is a practical oriented & industrial level training program for all students who have aspiration to work in the core technical industry domain. This

More information

ISDP 2018 Industry Skill Development Program In association with

ISDP 2018 Industry Skill Development Program In association with ISDP 2018 Industry Skill Development Program In association with Penetration Testing What is penetration testing? Penetration testing is simply an assessment in a industry computer network to test the

More information

Lab 6: OS Security for the Internet of Things

Lab 6: OS Security for the Internet of Things Department of Computer Science: Cyber Security Practice Lab 6: OS Security for the Internet of Things Introduction The Internet of Things (IoT) is an emerging technology that will affect our daily life.

More information

NEST Kali Linux Tutorial: Burp Suite

NEST Kali Linux Tutorial: Burp Suite NEST Kali Linux Tutorial: Burp Suite Burp gives you full control, letting you combine advanced manual techniques with state-of-the-art automation, to make your work faster, more effective, and more fun.

More information

Advanced Penetration Testing

Advanced Penetration Testing Advanced Penetration Testing Additional Insights from Georgia Weidman More Guessable Credentials: Apache Tomcat In the course we looked at specific examples of vulnerabilities. My goal was to cover as

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

Principles of ICT Systems and Data Security

Principles of ICT Systems and Data Security Principles of ICT Systems and Data Security Ethical Hacking Ethical Hacking What is ethical hacking? Ethical Hacking It is a process where a computer security expert, who specialises in penetration testing

More information

Lab 6: OS Security for the Internet of Things

Lab 6: OS Security for the Internet of Things Department of Computer Science: Cyber Security Practice Lab 6: OS Security for the Internet of Things Introduction The Internet of Things (IoT) is an emerging technology that will affect our daily life.

More information

ODDS (Olympus Dictation Delivery Service) Setup

ODDS (Olympus Dictation Delivery Service) Setup ODDS (Olympus Dictation Delivery Service) Setup This quick and easy How-To Guide will help you set up your new ODDS account and enable you to start using the Olympus Dictation App on your Smartphone. 1.

More information

CyberP3i Hands-on Lab Series

CyberP3i Hands-on Lab Series CyberP3i Hands-on Lab Series Lab Series using NETLAB Designer: Dr. Lixin Wang, Associate Professor Hands-On Lab for Application Attacks The NDG Security+ Pod Topology Is Used 1. Introduction In this lab,

More information

Metasploit. Installation Guide Release 4.4

Metasploit. Installation Guide Release 4.4 Metasploit Installation Guide Release 4.4 TABLE OF CONTENTS About this Guide Target Audience...1 Organization...1 Document Conventions...1 Support...2 Support for Metasploit Pro and Metasploit Express...2

More information

SAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide

SAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide SAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide Introduction This onboarding guide covers tasks that account administrators need to perform to set up SAS Visual Statistics and SAS Visual Analytics

More information

How to Phishing Android Smart Phone Users Through SMS Message

How to Phishing Android Smart Phone Users Through SMS Message How to Phishing Android Smart Phone Users Through SMS Message Introduction Myeonggil Kong Nowadays, we are doing everything through a smart phone. Because of that, many crimes occur through the smart phone.

More information

cs642 /introduction computer security adam everspaugh

cs642 /introduction computer security adam everspaugh cs642 computer security /introduction adam everspaugh ace@cs.wisc.edu definition Computer Security := understanding and improving the behavior of computing systems in the presence of adversaries adversaries

More information

Changing face of endpoint security

Changing face of endpoint security Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L

More information

ITG Software Engineering

ITG Software Engineering Android Security Course ID: Page 1 Last Updated 12/15/2014 Android Security ITG Software Engineering Course Overview: This 5 day course covers the Android architecture, the stack, and primary building

More information

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8 Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Manual Android Virtual Device Failed To Load Error

Manual Android Virtual Device Failed To Load Error Manual Android Virtual Device Failed To Load Error When I click on the Windows tab and then select Android Virtual Device Manager, I get the error "Android Virtual Device failed to load". I have attached

More information

Chapter 2 Setting Up for Development

Chapter 2 Setting Up for Development Introduction to Android Application Development, Android Essentials, Fifth Edition Chapter 2 Setting Up for Development Chapter 2 Overview Learn how to set up our Android development environment Look at

More information

Injectable Exploits. New Tools for Pwning Web Apps and Browsers

Injectable Exploits. New Tools for Pwning Web Apps and Browsers Injectable Exploits New Tools for Pwning Web Apps and Browsers Kevin Johnson kevin@inguardians.com Justin Searle justin@inguardians.com Frank DiMaggio frank@secureideas.net 1 Who are we? Kevin Johnson

More information

Module 1: Penetration Testing Planning and Scoping. Module 2: Basic Usage of Linux and its services

Module 1: Penetration Testing Planning and Scoping. Module 2: Basic Usage of Linux and its services Following topics will be covered: Module 1: Penetration Testing Planning and Scoping - Types of penetration testing and ethical hacking projects - Penetration testing methodology - Limitations and benefits

More information

Installing LAMP on Ubuntu and (Lucid Lynx, Maverick Meerkat)

Installing LAMP on Ubuntu and (Lucid Lynx, Maverick Meerkat) Installing LAMP on Ubuntu 10.04 and 10.10 (Lucid Lynx, Maverick Meerkat) April 29, 2010 by Linerd If you're developing websites, it's nice to be able to test your code in the privacy of your own computer

More information

Attacks Against Websites 3 The OWASP Top 10. Tom Chothia Computer Security, Lecture 14

Attacks Against Websites 3 The OWASP Top 10. Tom Chothia Computer Security, Lecture 14 Attacks Against Websites 3 The OWASP Top 10 Tom Chothia Computer Security, Lecture 14 OWASP top 10. The Open Web Application Security Project Open public effort to improve web security: Many useful documents.

More information

Long Beach Unified School District. Portal User s Guide. August 2014

Long Beach Unified School District. Portal User s Guide. August 2014 Long Beach Unified School District Portal User s Guide August 2014 INTRODUCTION The Long Beach Unified School District s PORTAL (mylbusd) provides users with access to District applications, services,

More information

FreeRangeRemote Access

FreeRangeRemote Access City of Westminster User Guide to FreeRangeRemote Access For Android tablets using the native browser (Chrome) https://freerange.cityofwestminster.us IMPORTANT! Some versions of Chrome on Android are unable

More information

Adobe Marketing Cloud Bloodhound for Windows 2.2

Adobe Marketing Cloud Bloodhound for Windows 2.2 Adobe Marketing Cloud Bloodhound for Windows 2.2 Contents Bloodhound 2.2 for Windows...3 Getting Started...4 Configure Devices to Send Hits to Bloodhound...5 Enable SSL...6 View Hits...7 Last updated 5/1/2017

More information

Procedure for Connecting to OIL VPN

Procedure for Connecting to OIL VPN Procedure for Connecting to OIL VPN Contents Introduction... 1 Pre-requisites... 1 How to Connect to OIL VPN... 1 Access using Checkpoint remote access client... 2 Note for macos users... 6 Accessing using

More information

Installation Instructions

Installation Instructions Installation Instructions Last updated: 08 May 2017 Contents 1. Introduction... 3 2. Windows Installation... 3 2.1. Installing Dictionary App Builder... 3 2.2. Installing Java SE Development Kit (JDK)...

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

L.A.M.P. Stack Part I

L.A.M.P. Stack Part I L.A.M.P. Stack Part I By George Beatty and Matt Frantz This lab will cover the basic installation and some configuration of a LAMP stack on a Ubuntu virtual box. Students will download and install the

More information

Allen University Microsoft Office 365

Allen University Microsoft Office 365 Allen University Microsoft Office 365 Here's what you need to know to complete the transition On December 18 at 5:00pm, the University will complete the migration to Office 365, a new version of the hosted

More information

Acronis Backup extension for Plesk

Acronis Backup extension for Plesk Acronis Backup extension for Plesk ADMINISTRATOR S GUIDE Table of contents 1 Introduction...3 2 Software requirements...3 3 Limitations...3 4 Installing the extension...3 5 Enabling backup...4 6 Uninstalling

More information

Minds-on: Android. Session 1

Minds-on: Android. Session 1 Minds-on: Android Session 1 Paulo Baltarejo Sousa Instituto Superior de Engenharia do Porto 2016 Outline Mobile devices Android OS Android architecture Android Studio Practice 1 / 33 2 / 33 Mobile devices

More information

1 Introduction Requirements Architecture Feature List... 3

1 Introduction Requirements Architecture Feature List... 3 Contents 1 Introduction... 2 1.1 Requirements... 2 1.2 Architecture... 3 1.3 Feature List... 3 1.3.1 Device Compliance status... 3 1.3.2 Auto grouping for devices... 4 1.4 Basic Deployment... 4 1.4.1 Prepare

More information

PLEASE READ THIS GUIDE CAREFULLY BEFORE ATTEMPTING TO OPERATE THE ISATHUB. ISAVI ISATHUB QUICK START GUIDE

PLEASE READ THIS GUIDE CAREFULLY BEFORE ATTEMPTING TO OPERATE THE ISATHUB. ISAVI ISATHUB QUICK START GUIDE PLEASE READ THIS GUIDE CAREFULLY BEFORE ATTEMPTING TO OPERATE THE ISATHUB. ISAVI ISATHUB QUICK START GUIDE Your Satellite Telephone Number is: (supplied at time of delivery) Your Wi-Fi Password is: TBD

More information

How to access Launchpad and Textbooks online

How to access Launchpad and Textbooks online Quest Tech Tips Launchpad & Textbooks Online Directions (front and back) How to setup your mobile device to receive school/district notifications (front and back) Edline parent instructions Free Microsoft

More information

SD Module- Android Programming

SD Module- Android Programming Assignment No. 1 SD Module- Android Programming R (2) C (4) V (2) T (2) Total (10) Dated Sign Title: Download Install and Configure Android Studio on Linux /windows platform. Problem Definition: Install

More information

1 Introduction Requirements Architecture Feature List... 4

1 Introduction Requirements Architecture Feature List... 4 Contents 1 Introduction... 2 1.1 Requirements... 2 1.2 Architecture... 3 1.3 Feature List... 4 1.3.1 Device Compliance status... 4 1.3.2 Auto grouping for devices... 5 1.3.3 Auto grouping for applications...

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

QUICKBOOKS ONLINE PLUS: A COMPLETE COURSE 2016

QUICKBOOKS ONLINE PLUS: A COMPLETE COURSE 2016 QUICKBOOKS ONLINE PLUS: A COMPLETE COURSE 2016 Chapter 2: Create a Company Part 1: Create Email, Access Trial Version, Download Files Lecture Focus 2 Create a QuickBooks Online Email Account Activate Educational

More information

Penetration Testing. James Walden Northern Kentucky University

Penetration Testing. James Walden Northern Kentucky University Penetration Testing James Walden Northern Kentucky University Topics 1. What is Penetration Testing? 2. Rules of Engagement 3. Penetration Testing Process 4. Map the Application 5. Analyze the Application

More information

CS 410/510: Web Security X1: Labs Setup WFP1, WFP2, and Kali VMs on Google Cloud

CS 410/510: Web Security X1: Labs Setup WFP1, WFP2, and Kali VMs on Google Cloud CS 410/510: Web Security X1: Labs Setup WFP1, WFP2, and Kali VMs on Google Cloud Go to Google Cloud Console => Compute Engine => VM instances => Create Instance For the Boot Disk, click "Change", then

More information

Lab: Setting up PL-App with a Raspberry Pi

Lab: Setting up PL-App with a Raspberry Pi Lab Topology Objectives Set up a Raspberry Pi board as a PL-App device Use PL-App Launcher to provision and discover PL-App devices Background Cisco Prototyping Lab is a set of hardware and software components

More information

SSL VPN INSTALLATION GUIDE

SSL VPN INSTALLATION GUIDE SSL VPN INSTALLATION GUIDE Sonicwall VPN Client Download & Installation Guide For Windows Machines : 1) Open Browser and Browse the following URL to download the client. https://103.237.170.61/cgi-bin/welcome/virtualoffice

More information

Introduction to Penetration Testing: Part One. Eugene Davis UAH Information Security Club February 21, 2013

Introduction to Penetration Testing: Part One. Eugene Davis UAH Information Security Club February 21, 2013 Introduction to Penetration Testing: Part One Eugene Davis UAH Information Security Club February 21, 2013 Ethical Considerations: Pen Testing Ethics of penetration testing center on integrity (ISC)² Code

More information

OWASP German Chapter Stammtisch Initiative/Ruhrpott. Android App Pentest Workshop 101

OWASP German Chapter Stammtisch Initiative/Ruhrpott. Android App Pentest Workshop 101 OWASP German Chapter Stammtisch Initiative/Ruhrpott Android App Pentest Workshop 101 About What we will try to cover in the first session: Setup of a Mobile Application Pentest Environment Basics of Mobile

More information

CIS 76 Ethical Hacking Building an open source Pentest Sandbox, carrying out a Remote Code Execution exploit, and Remediating the RCE vulnerability.

CIS 76 Ethical Hacking Building an open source Pentest Sandbox, carrying out a Remote Code Execution exploit, and Remediating the RCE vulnerability. CIS 76 Ethical Hacking Building an open source Pentest Sandbox, carrying out a Remote Code Execution exploit, and Remediating the RCE vulnerability. Ryan Borden December 3, 2017 Contact: ryanborden81@gmail.com

More information

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date

More information

Setting Up Resources in VMware Identity Manager

Setting Up Resources in VMware Identity Manager Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Cloud UC. Program Downloads I WOULD LIKE TO... DOWNLOADING THE CLIENT SOFTWARE

Cloud UC. Program Downloads I WOULD LIKE TO... DOWNLOADING THE CLIENT SOFTWARE I WOULD LIKE TO... Cloud UC Program Downloads Avaya Cloud allows you to setup your telephone to be used the way you want it to. There are additional programs that extend the abilities of the application

More information

User Monitoring Smartphone App

User Monitoring Smartphone App User Monitoring Smartphone App Sonnen User Portal Sonnen User Portal Registration From any internet browser the end user will need to type https://meine.sonnenbatterie.de/login into the search engine search

More information

Accessing OUHSC. Requirements to log into Topaz Elements: Steps to Access TOPAZ Elements:

Accessing OUHSC. Requirements to log into Topaz Elements: Steps to Access TOPAZ Elements: Accessing OUHSC Requirements to log into Topaz Elements: 1. Access granted by the IACUC or IBC. 2. Pulse secure connection via gate.net.ou.edu. (See instructions below) 3. Silverlight compatible browser.

More information

Samsung Mobile Via Usb

Samsung Mobile Via Usb How To Install Android Apps From Pc To Samsung Mobile Via Usb Supported model : Smart Phone/Tablet from Galaxy Note III (Android OS 4.3 or over) When you connect your mobile device to Kies via a USB cable,

More information

Penetration Testing with Kali Linux

Penetration Testing with Kali Linux Penetration Testing with Kali Linux PWK Copyright Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security No part of this publication, in whole or in part, may

More information

evoclock+ - AsureForce Mobile V3.0 Reference Guide AsureForce Mobile Version 3.0 Reference Guide AsureForce Mobile 1 P a g e

evoclock+ - AsureForce Mobile V3.0 Reference Guide AsureForce Mobile Version 3.0 Reference Guide AsureForce Mobile 1 P a g e AsureForce Mobile Version 3.0 Reference Guide AsureForce Mobile 1 P a g e Table of Contents Quick Reference... 2 AsureForce Mobile... 3 Getting Started... 3 AsureForce Mobile App Setup... 3 AsureForce

More information

Android Studio Setup Procedure

Android Studio Setup Procedure Android Studio Setup Procedure System Requirements : Windows OS Linux OS Mac OS Microsoft Windows 7/8/10 (32- or 64-bit) 3 GB RAM minimum, 8 GB RAM recommended; plus 1 GB for the Android Emulator 2 GB

More information

Installation Instructions

Installation Instructions Installation Instructions Reading App Builder: Installation Instructions 2017, SIL International Last updated: 1 December 2017 You are free to print this manual for personal use and for training workshops.

More information

Hackveda Training - Ethical Hacking, Networking & Security

Hackveda Training - Ethical Hacking, Networking & Security Hackveda Training - Ethical Hacking, Networking & Security Day1: Hacking windows 7 / 8 system and security Part1 a.) Windows Login Password Bypass manually without CD / DVD b.) Windows Login Password Bypass

More information

How to Set up Eclipse and Android SDK Manager Environment You need to download the following

How to Set up Eclipse and Android SDK Manager Environment You need to download the following How to Set up Eclipse and Android SDK Manager Environment You need to download the following 1. Android Software development Kit (SDK) 2. Eclipse Package 3. Java JDK (if it is not installed on your Windows)

More information

Methodist University. Wireless Connectivity Guide. Version 1.5.0

Methodist University. Wireless Connectivity Guide. Version 1.5.0 Methodist University Wireless Connectivity Guide Version 1.5.0 Guide Updates... 3 Getting Started... 4 Available SSID s... 5 Unsecured Connectivity... 5 Methodist University... 5 MU_Guest... 5 MU_Devices...

More information

Choose OS and click on it

Choose OS and click on it 1. Installation: 1.1. Install Node.js. Cordova runs on the Node.js platform, which needs to be installed as the first step. Download installer from: https://nodejs.org/en/download/ 1.1.1. Choose LTS version,

More information

How to silently install Installation Manager and Rational Asset Manager from a command line

How to silently install Installation Manager and Rational Asset Manager from a command line How to silently install Installation Manager 1.5.3 and Rational Asset Manager 7.5.1.1 from a command line By Patchanee Petprayoon Unleash the Labs, Solution Architect for Energy and Utilities sector Created

More information

Chapter 5: Vulnerability Analysis

Chapter 5: Vulnerability Analysis Chapter 5: Vulnerability Analysis Technology Brief Vulnerability analysis is a part of the scanning phase. In the Hacking cycle, vulnerability analysis is a major and important part. In this chapter, we

More information

Connecting Remotely Staff & Students

Connecting Remotely Staff & Students Connecting Remotely Staff & Students Install VMware Horizon View client There are two main ways to access the college network remotely using VMware on your computer, either (1) connecting directly through

More information

Step 1: Syncing Your Library. After installing One Drive for Business, you will be prompted to Sync a library. NEXT: Select the Library URL

Step 1: Syncing Your Library. After installing One Drive for Business, you will be prompted to Sync a library. NEXT: Select the Library URL Step 1: Syncing Your Library After installing One Drive for Business, you will be prompted to Sync a library. NEXT: Select the Library URL For this, we want to choose the URL that connects to your Office

More information

AllBe1 Anywhere dongle user guide

AllBe1 Anywhere dongle user guide AllBe1 Anywhere dongle user guide Table of Contents 1. Introduction... 1 2. System requirements... 2 3. PC application installation... 2 4. Using the PC App'... 4 5. Trouble shooting.... 9 1. Introduction

More information

PINNACLE WEB GRADEBOOK Information Technology Services. Palm Guide - HotSync

PINNACLE WEB GRADEBOOK Information Technology Services. Palm Guide - HotSync PINNACLE WEB GRADEBOOK Information Technology Services Palm Guide - HotSync PINNACLE WEB GRADEBOOK Palm Guide - HotSync Information Technology Services 13135 SW 26 ST Miami, FL 33176 Rev. 11.06.09 This

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

QUICK START GUIDE. Quick Start Guide. This will assist you to setup and distribute content to a StratosMedia Player device in 4 easy steps.

QUICK START GUIDE. Quick Start Guide. This will assist you to setup and distribute content to a StratosMedia Player device in 4 easy steps. Quick Start Guide This will assist you to setup and distribute content to a StratosMedia Player device in 4 easy steps. NOTE: All devices need active internet connectivity. Google Chrome is a browser that

More information

Dynamic Detection of Inter- Application Communication Vulnerabilities in Android. Daniel Barton

Dynamic Detection of Inter- Application Communication Vulnerabilities in Android. Daniel Barton Dynamic Detection of Inter- Application Communication Vulnerabilities in Android Daniel Barton Authors/Paper Metadata Roee Hay IBM Security Omer Tripp IBM T.J. Watson Research Center Marco Pistoia IBM

More information

Qustodio. User Guide. Copyright Qustodio Technologies S.L. All rights reserved. Revised on June 2017.

Qustodio. User Guide. Copyright Qustodio Technologies S.L. All rights reserved. Revised on June 2017. Qustodio User Guide Copyright Qustodio Technologies S.L. All rights reserved. Revised on June 2017. Table of Contents 1. INTRODUCTION... 3 1.1. WHAT IS QUSTODIO?... 3 1.2. FEATURES AND BENEFITS... 4 2.

More information

Setting up VPS on Ovh public cloud and installing lamp server on Ubuntu instance

Setting up VPS on Ovh public cloud and installing lamp server on Ubuntu instance Setting up VPS on Ovh public cloud and installing lamp server on Ubuntu instance What is OVH Public Cloud Public Cloud Instances provides a choice of two types of virtual machines: the RAM instances are

More information

Google Groups. Using, joining, creating, and sharing. content with groups. What's Google Groups? About Google Groups and Google Contacts

Google Groups. Using, joining, creating, and sharing. content with groups. What's Google Groups? About Google Groups and Google Contacts Google Groups Using, joining, creating, and sharing content with groups What's Google Groups? Google Groups is a feature of Google Apps that makes it easy to communicate and collaborate with groups of

More information

Attacks Against Websites. Tom Chothia Computer Security, Lecture 11

Attacks Against Websites. Tom Chothia Computer Security, Lecture 11 Attacks Against Websites Tom Chothia Computer Security, Lecture 11 A typical web set up TLS Server HTTP GET cookie Client HTML HTTP file HTML PHP process Display PHP SQL Typical Web Setup HTTP website:

More information

School Installation Guide ELLIS Academic 5.2.6

School Installation Guide ELLIS Academic 5.2.6 ELLIS Academic 5.2.6 This document was last updated on 2/16/11. or one or more of its direct or indirect affiliates. All rights reserved. ELLIS is a registered trademark, in the U.S. and/or other countries,

More information

App Orchestration 2.6

App Orchestration 2.6 Configuring NetScaler 10.5 Load Balancing with StoreFront 3.0 and NetScaler Gateway for Last Updated: June 04, 2015 Contents Introduction... 3 Configure the NetScaler load balancer certificates... 3 To

More information

for businesses with more than 25 seats

for businesses with more than 25 seats for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use

More information

Setting up your YouTube Account

Setting up your YouTube Account Online & Extended Learning Getting Started with YouTube Student Help Contents Setting up your YouTube Account... 1 How to Login to your YouTube Account... 4 How to Upload Videos to YouTube... 5 Uploading

More information

AHNLAB 조주봉 (silverbug)

AHNLAB 조주봉 (silverbug) AHNLAB 조주봉 (silverbug) Android Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Application framework Dalvik virtual machine Integrated

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Marketo Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager IdeaScale Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

12.1 Introduction OpenCV4Android SDK Getting the SDK

12.1 Introduction OpenCV4Android SDK Getting the SDK Chapter 12 OpenCV For Android 12.1 Introduction OpenCV (Open Source Computer Vision Library) is a popular open source software library designed for computer vision application and machine learning. Its

More information

How To Change My Wordpress Database

How To Change My Wordpress Database How To Change My Wordpress Database Password On Instagram Account Built by one of the world's largest Instagram browsers INK361, this comprehensive widget that can showcase your Instagram account in the

More information

Mobile Devices prioritize User Experience

Mobile Devices prioritize User Experience Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile

More information

ZK Mobile for Android The Quick Start Guide

ZK Mobile for Android The Quick Start Guide potix SIMPLY REACH ZK Mobile for Android TM The Quick Start Guide Version 0.8.1 Feburary 2008 ZK Mobile for Android for Android: Quick Start Guide Page 1 of 14 Copyright. All rights reserved. The material

More information

Manual Android Virtual Device Failed To Load Click Details

Manual Android Virtual Device Failed To Load Click Details Manual Android Virtual Device Failed To Load Click Details i am new to android 1_i am not able to see any option after clicking on 'run as' an android virtual device that failed to load.click 'details''.i

More information

Social Ecology 101: Connecting with a pod

Social Ecology 101: Connecting with a pod Social Ecology 101: Connecting with a pod In Social Ecology 1 room 101, there are 7 pod stations located throughout the room. If allowed by the instructor, students can join pods with their computer or

More information

Virtual Desktop Infrastructure Setup for Android

Virtual Desktop Infrastructure Setup for Android Virtual Desktop Infrastructure Setup for Android Virtual Desktop Infrastructure (VDI) allows you to connect to a virtual computer and use software that you don t have installed on your own computer or

More information

Android App Development. Ahmad Tayeb

Android App Development. Ahmad Tayeb Android App Development Ahmad Tayeb Ahmad Tayeb Lecturer @ Department of Information Technology, Faculty of Computing and Information Technology, KAU Master degree from Information Sciences and Technologies,

More information

Installing Joomla

Installing Joomla Installing Joomla 3.0.11 To start installing Joomla 3.X you have to copy the zipped file Joomla_3.0.1-Stable-Full_Package.zip to the folder in which you want to install Joomla 3.X. On a web host this is

More information

Methodist University. Wireless Connectivity Guide. Version 1.2

Methodist University. Wireless Connectivity Guide. Version 1.2 Methodist University Wireless Connectivity Guide Version 1.2 Getting Started... 3 Available SSID s... 4 Unsecured Connectivity... 4 Methodist University... 4 MU_Guest... 4 MU_Devices... 4 Secured Connectivity...

More information

Lab 3: Introduction to Metasploit

Lab 3: Introduction to Metasploit Lab 3: Introduction to Metasploit Aim: The airm of this lab is to develop and execute exploits against a remote machine and test its vulnerabilities using Metasploit. Quick tool introduction: Metasploit

More information

Developing Android applications in Windows

Developing Android applications in Windows Developing Android applications in Windows Below you will find information about the components needed for developing Android applications and other (optional) software needed to connect to the institution

More information

ULTEO OPEN VIRTUAL DESKTOP DEBIAN WHEEZY (7.0) SUPPORT

ULTEO OPEN VIRTUAL DESKTOP DEBIAN WHEEZY (7.0) SUPPORT ULTEO OPEN VIRTUAL DESKTOP V4.0.2 DEBIAN WHEEZY (7.0) SUPPORT Contents 1 Prerequisites: Debian Wheezy (7.0) 3 1.1 System Requirements.............................. 3 2 Repository 4 2.1 Online Method..................................

More information

MAIN HEADING: MyMTN App

MAIN HEADING: MyMTN App MAIN HEADING: MyMTN App EXPLANATION: MTN is pleased to announce the launch of the new all-in-one self-service MyMTN mobile application All about the My MTN App!! MTN is pleased to announce the launch of

More information

Configuring a Remote Desktop Connection for the Stat Apps Server

Configuring a Remote Desktop Connection for the Stat Apps Server Configuring a Remote Desktop Connection for the Stat Apps Server This page contains instructions for setting up a remote desktop connection to the Statistical Applications Terminal Server (also known as

More information

User documentation. BEEM v1.0 January 2010

User documentation. BEEM v1.0 January 2010 User documentation BEEM v1.0 January 2010 1 Table of contents Table of contents... 2 About this paper... 3 Using this manual... 3 Navigation keys... 4 Conventions... 5 Support... 5 Installation/Uninstallation...

More information

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 Business drivers and their impact on IT AGILITY Move fast, be nimble and flexible 66% of business owners identify business agility as a priority EFFICIENCY

More information

SJ Provider Directory Contents

SJ Provider Directory Contents SJ Provider Directory Contents SJ Provider Directory... 1 Accessing the Directory... 2 Apple Devices... 2 Android Devices... 2 Other Devices or Desktop Computers... 2 Browsers... 2 Requesting a New Account...

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager EchoSign Provisioning Connector Guide McAfee Cloud Identity Manager version 3.5 and later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information