Advanced Cloud Penetration Testing

Assignment Help Other Subject
Reference no: EM133305547

Advanced Cloud Penetration Testing and Forensics

Learning Outcome 1: Formulate an attack strategy to penetrate cloud-based systems within legal boundaries and accepted scope.
Learning Outcome 2: Recommend remedies for compromised cloud systems..
Learning Outcome 3: Explain the extent and impact of an attack using a forensic approach
Learning Outcome 4: Employ attack strategies to attempt to penetrate a target computer system

Security Analysis Practical

Create your security case study by choosing a specific domain/s to do your penetration testing and risk assessments and countermeasures.
Make sure to take permission before starting the assignment.

Passive security artefacts, accepted, in the case of facing any difficulties obtaining the permissions.

Section A)
Scanning is a set of procedures for identifying live hosts, ports, and services, discovering Operating system and architecture of the target system, Identifying vulnerabilities and threats in the network. Network scanning is used to create a profile of the target organisation.
Scanning refers to collecting more information using sophisticated and aggressive reconnaissance techniques

1) Use nmap, zenmap, netscan, masscan. Scapy and hping3 tools from Kali Linux to scan Metasploit Virtual machine,
Critically analyse the results to show the open ports and the services running on different ports and highlight on the advanced features in nmap.
Perform another sweep scanning on a specific network using the zenmap to draw The Network Topology.

Section B)
1- Perform a thematic literature review, on the latest development in the field of Intrusion Detection and Prevention (IPS/IDS), using anomaly, protocol, and signature inspection methods.
Use scholarly articles, books, and other sources (e.g., dissertations, conference proceedings) to insightfully and critically surveyed relevant literature.
2- Use Snort as IDS to detect ICMP, nmap , hping3, create your own rules to alert about any tcp connection from any external source to our ssh port.
Support your work with codes and screenshots.

Section C)
1. Evaluate the digital forensic memory analyses in terms of the processes, pslist, pstree, LdrModules, hashdump, and other volatility plugins to get significant digital evidence.

2. Assuming that a forensic team follows the standard steps for preserving evidence integrity and keeping an unbroken chain of custody, what did they do to convince the court, and why they have done so?

Section D)
1. Critically evaluate the Metasploit Framework and explains why it is important to use this framework during the penetration testing process and the main functionality of this product.

2. Give an example of using MSF to exploit a vulnerability in a remote system. Support your case with screenshots, and show your ability to solve different technical issues.

Reference no: EM133305547

Questions Cloud

What skills did the leader demonstrate : What skills did the leader demonstrate and what was their effectiveness in leading change. What did they do well, or could have improved upon? Regarding BMO
Credit default swap transaction : Bank A enters into a credit default swap transaction with bank B to hedge its debt exposure to company R.
How would you rule based on legal standard in lefevre case : How would you rule, based on the legal standard in the LeFevre case above Use IRAC to analyze this claim and explain your ruling.
What is the appropriate amount of resources to invest : What is the appropriate amount of resources (e.g., time, employees, money, technology, products) to invest in the Commitment for JPMorgan Chase?
Advanced Cloud Penetration Testing : SEC7002 Advanced Cloud Penetration Testing, University of Bolton, Formulate an attack strategy to penetrate cloud-based systems within legal boundaries
How effective are management training sessions programs : How effective are management training sessions or leadership programs? How can effectiveness be measured?
What about a law clerk and an investigator at a law firm : What about a law clerk and an investigator at a law firm? How about an HR manager and a service manager at a baked goods manufacturer?
Compute the borrower asset value : What information do you need to be able to compute the borrower's asset value when using a single factor t-distributed asset value model?
Calculate the discounted cash flow : Calculate the Discounted Cash Flow (DCF) of both these investments?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd