Reference no: EM133102273 , Length: word count:3500
CMP7171 Advanced Ethical Hacking - Birmingham City University
Technical Report on Widge Warehouse
Learning Outcome 1: Critically evaluate the requirements for penetration testing and ethical hacking
Learning Outcome 2: Design security assessment experiments to expose security vulnerabilities.
Learning Outcome 3: Critically evaluate resulting data from security assessment experiments to recommend remedial actions.
Learning Outcome 4: Critically appraise the role of security testing within the wider context of continuous security improvements to the information assurance processes within an organisation.
Assessment Details: Technical Report on Widget Warehouse
Style:A technical ethical hacking/penetration testing report on the vulnerabilities of a given network topology.
Description:Technical report on security within a given network topology
Additional information: Technical report based on industry standard for ethical hacking and penetration testing.
Rationale:
As a Security professional for Rebel Alliance Security, you have been hired to perform a security audit on the Empire_DeathStar server. The system test will be based on a closed environment test, where you will have limited knowledge of the client's network and systems. This is a key skill required for network security and information security engineers.
You are to perform an ethical hack/security audit on the system and produce a report for the management team of their level of security. The system will be based on a number of Capture the Flag tests within the virtual environment.
The company is also concerned with wireless security, the wireless network is currently usingWPA for its network security, as a security analyst you have to show the weakness of WPA is exposed byshowing the WPA key to the customer. The SSID is being broadcast (Widget_W). Within the report state the weaknesses of WPA and state the WPA key that they have been using, alsorecommending a stronger security protocol for the wireless network.
The Report:
The report should be 3500 - 4000 words in length.
The report should show the vulnerabilities and recommendations for rectifying them:
1. Report on the overall level of security within the network
2. Report on the WPA security
3. Report on the different OS's within the network
4. Issues with the web server and what are the key vulnerabilities.
The report should include the following tools:
1. OpenVas
2. Metaspliot framework or other tools used
3. NMAP or other network scanning tools that you have used.
Include within the report:
1. Executive Summary - Provide an outline of the network tests
2. The Summary of Results
3. Attack Narrative - Provide an review of the attacks carried out and the results
4. Conclusion
5. Recommendations Risk Rating
Also include Appendix A: Vulnerability Detail and Mitigation
Attachment:- Advanced Ethical Hacking.rar