Possible topics - panmari/moco-project GitHub Wiki

Some possible topics for the project

Raspberry jam

Jamming device based on a rasperry pi, making it highly mobile but with enough computational power, if anything smart needs to be done (possibly not the case for a jammer). Probably needs specialized hardware, that we don't have.

Android package sniffer for pop/imap

The Email account is the gateway to the digital identity, but we think that most people don't use secure technologies for a lack of awareness.

  • Autosteal facebook account on unsecure networks (Starbuckz).
  • CRAM MD5 might be insecure as well, but no known attack. MD5 allows to produce many messages to a given hash-code, but we're not sure how that could be used. Might require help.

Crowdsourced connectivity plot

Draw a connectivity map similarly to the pictures shown in the lecture. Most probably we would take phone carrier signal for this. While pretty and useful (and legal), it is neither complex nor very instructive.

WEP or WPA cracker for Android

Use known weaknesses of said algorithms to create an attack that can be applied to a network with an Android device. This might be somewhat problematic in that it requires promiscuous or monitoring mode devices. We have one. Computing power and data storage might be a problem, but are probably not.

Monster Hunt - A game for Android

Use location data of a smartphone to create "monster spawns" in close by locations, instruct the player to go there and defeat them somehow (eg by waving around phone (measured by motion sensors)). Might involve teamwork (monsters are global - for all players).

Catch! another game for Android

Players (by city) are matched into bounty hunters and targets. Hunters must catch the targets (maybe measured by getting a bluetooth fix on someone - or a bit less interestingly - by GPS). Targets must escape for a fixed amount of time. In ever-decreasing intervals, the hunters get the GPS coordinates of their targets.

It sounds fun, but might turn out to be boring. And right from the top of my head, I can think of at least 3 ways to cheat at it (most involving faking the location of the device).