Show simple item record

dc.contributor.advisorMcCoy, Mark
dc.contributor.authorCauley, Austin T.
dc.date.accessioned2022-08-24T19:35:19Z
dc.date.available2022-08-24T19:35:19Z
dc.date.issued2022
dc.identifier.other(AlmaMMSId)9982877910202196
dc.identifier.urihttps://hdl.handle.net/11244/336505
dc.description.abstractIn response to the COVID-19 pandemic, large businesses and organizations relied on video conferencing applications such as Zoom to maintain public health guidelines due in part to their robust set of features to facilitate productive group events while maintaining social distancing recommendations. While Zoom has many features that can be found in similar video conferencing applications, Zoom also contains a plethora of unique and cutting-edge features to entice modern users. However, when new features are introduced, an inherent risk of vulnerability exploitation has the potential to overshadow the benefits of the feature. One such vulnerable feature within Zoom webinar that is often overlooked is the post-attendee URL, a feature that allows Zoom webinar hosts to set a URL that participants will be redirected to after joining. This study aims to showcase the vulnerabilities of this feature by utilizing URLs of malicious websites and direct download links of files to transmit malware to Zoom webinar participants of the desktop application version of Zoom webinar. This study will also provide an analysis of the residual digital artifacts that are left behind when this feature is utilized to provide digital forensic examiners with the ability to create a comprehensive timeline of events for cases involving this type of attack.en_US
dc.rightsAll rights reserved by the author, who has granted UCO Chambers Library the non-exclusive right to share this material in its online repositories. Contact UCO Chambers Library's Digital Initiatives Working Group at diwg@uco.edu for the permission policy on the use, reproduction or distribution of this material.
dc.subject.lcshVideoconferencing
dc.subject.lcshMalware (Computer software)
dc.subject.lcshElectronic evidence
dc.titleAn analysis into the exploitation of the post-attendee URL feature in Zoom webinar regarding malware transmissionen_US
dc.typeAcademic theses
dc.contributor.committeeMemberElliot, Rachael
dc.contributor.committeeMemberPark, Myung-Ah
dc.thesis.degreeM.S., Forensic Science - Digital Forensics
dc.subject.keywordsArtifacts
dc.subject.keywordsExploitation
dc.subject.keywordsMalware
dc.subject.keywordsPhishing
dc.subject.keywordsVulterabilities
dc.subject.keywordsZoom
dc.subject.keywordsComputer science
dc.identifier.oclc(OCoLC)1342450609
thesis.degree.grantorJackson College of Graduate Studies


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record