7CS023 Ethical Hacking Assignment

Assignment Help Other Subject
Reference no: EM132932676 , Length: 2350 Words

7CS023 Ethical Hacking - University of Wolverhampton

Assessment - Ethical Hacking as a proactive and adversarial approach to secure systems.

1. Assessment Brief

The purpose of this assignment is to perform and document a penetration testing phase as part of a practical ‘offensive security' approach against a known network topology with distinguished characteristics and services. Furthermore, the report incorporates state-of-the-art research to demonstrate in-depth theoretical knowledge of a network security auditing paradigm regarding application and network layer attacks. You will learn how to defend a system and provide a better set of services in terms of security and availability and to further understand how planning and executing a set of steps and methods can seriously affect the security of a network.

2. Ethical and Legal Implications
Due to the nature of this module, you MUST ensure that ALL the attacks performed during the coursework are carefully contained within a controlled laboratory environment. The expected approach is to utilise virtual technology (e.g. VMware, Hyper-V or VirtualBox) to build your own lab.

Performing attacks on the virtual machines within the dedicated University laboratory is permitted, but it is very important to note that attacking the rest of the university network is NOT allowed. A full monitoring process will be in place and offenders could be prosecuted. Ask your lecturer to clarify any doubts shall you have further inquiries. Overall, make sure you comply with UK-legislation and all associated professional and ethical behaviour.

The purpose of this assignment is NOT to teach you how to break computer systems but rather to understand how the countermeasures are applied to protect your potentially vulnerable infrastructure.

3. Prerequisites and Preparation
Element 1: For the practical part of this assignment, you will have to build Virtual Machines (VM), an exemplar scenario is clarified below but you can choose a different setup:
1. A Server
o You could use a Linux (e.g. CentOS, Ubuntu Server), or a Windows Server
o Minimum configuration required
Two services of your own choice (e.g. DHCP, FTP, SMTP, SNMP, Web etc)
2. A Client
o Could be either Windows (Visa, 7, 8, 10 etc) or Linux (Fedora, Ubuntu etc)
o You could create multiple copies of the client's VM if you require more clients to demonstrate an attack
3. Attacker machine
o Kali Linux (the most recent version is highly recommended)
Element 2: For this element, you are required to reference peer-reviewed papers. Access to academic databases/journals such as IEEE Xplore, Scopus etc is given via the UoW Library Catalogue: https://www2.wlv.ac.uk/lib/Summon/

4. Deliverables
There are two submissions for this assignment as it is consisting of two parts as follows:

Element 1
In this first part of the assignment, you are required to plan and demonstrate a case study of offensive security:
• Provide a summary of the configuration steps (e.g. for the server and client machines). Include screenshots to show that the environment is functional (e.g. to evident functionality at the client-side). Discuss the rationale behind service selection and configuration.
• Demonstrate a minimum of 2 attacks in total against the services configured. Any further and complex attack steps will attract more marks. Log all the important and offensive events against your target including attacks detected, services' logs nature, the origin of the attack and damage caused. Support your demonstration with screenshots.
• Critically reflect on countermeasures and prevention mechanisms applied to mitigate against your attacks.

Element 2
In the second part of the report, you are required to write a short position paper to critically analyse and reflect on recent state-of-the-art attacks and hacking techniques, followed by a discussion on possible countermeasures.
Your paper should consider the following guidance and contain the following subtitles as a minimum:
• Title page and Abstract
• Introduction
o The nature of the brief/commission and the topic should be briefly outlined and defined alongside details of how the paper is organised.
o Scope: how did you select the attacks/techniques in this paper? E.g. most recent attacks, wireless attacks, IoT attacks, DNS attacks etc
• Main body
o Critical discussion, reflection and analysis
• Conclusions
o A brief summary of the key findings established from your research.
• References.
o A full list of references used within the paper should be provided. The Harvard Style of referencing should be applied throughout the assignment.

Attachment:- Ethical Hacking.rar

Reference no: EM132932676

Questions Cloud

How do bears get the energy they need to live : Select the FOREST tab Form Hypothesis (make an educated guess): How do bears get the energy they need to live?
What is the current bond price : Langford issued 14 year bonds a year ago at a coupon rate of 6.9%. The bonds make semiannual payments. If the YTM is 5.2%, what is the current bond price
What is scientific method : A. How is zoology related to other field of science such as natural, social and physical science?
What is the total amount of the costs : The Northridge Store is just one of many stores owned and operated by the company. What is the total amount of the costs
7CS023 Ethical Hacking Assignment : 7CS023 Ethical Hacking Assignment Help and Solution, University of Wolverhampton - Assessment Writing Service - Ethical Hacking as a proactive and adversarial
Determine the approximate pmi using evidence : Determine the approximate PMI using evidence from algor mortis. Show your work. Estimate the PMI if the victim's body temperature at the crime scene was.
The future of body fluid identification : This question is based on the article in "Forensic Science: The Future of Body Fluid Identification" Based on the current methods of identifying body fluids in
Graph for tetraethylammonium with voltages labeled : Please draw a graph for tetraethylammonium (TEA) with voltages labeled on the y axis and time labeled on the x axis
What is the yield to maturity : The bonds are currently selling for $1,150. The bonds mature in 20 years. The bonds can be called in 8 year for $1,100. What is the yield to maturity

Reviews

Write a Review

Other Subject Questions & Answers

  The business cycle might best be described

The business cycle might best be described as_?

  What might shakespeare be saying about spoken language

Consider also Dogberry's determination that someone write down that he "is an ass." How might that be connected with the end of the play, in the scene that determines Beatrice and Benedick are in love? What might Shakespeare be saying about spok..

  Analyze the physical activity data using smart phones

How will you Initially Analyze the Physical Activity Data using smart phones for curing mental illness?

  Archaeologists and historians-chiefdom societies

Archaeologists and historians have found that most chiefdom societies:

  An interaction effect is a change in the simple main effect

An interaction effect is a change in the simple main effect of one variable over levels of the second.

  What are marias real and potential health risks

As the school nurse working in a college health clinic, you see many opportunities to promote health. Maria is a 40-year-old Hispanic woman who is in her second year of nursing school. She complains of a 14-pound weight gain since starting school ..

  How do you see this being applied in your workplace

Nurses in various settings are adopting a research-based (or evidence-based) practice that incorporates research findings .

  What is the variance in the expected rate of return

Corporation has a 0.1 probability of a return of 0.01, a 0.1 probability of a rate of return of 0.06, and the remaining probability of a 0.8 rate of return.

  Define broad generalization and a recommended alternative

List six words that signal a broad generalization and a recommended alternative that would resolve that problem of each

  How does the behavior look in the light of day

ETHICS: Radio TV Reports (RTV) was in the business of recording, transcribing, and monitoring radio and video programming for its clients.

  Develop a continuous improvement plan

PPMP20009 Leading Lean Projects Assessment - Case study: Continuous Improvement. Develop a continuous improvement plan

  Explain why do you think one of the methods in the heimerl

q1. why do you think one of the methods in the heimerl 2010 article would be the most effective way for an organization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd