Create a kali hacking tools presentation

Assignment Help Other Subject
Reference no: EM133157134

Group Presentation: Research Security vulnerability tools using Kali (Linux)

Topic - Burp suite

It is an individual assignment for online students and a group-based assignment for on- campus students. Online students need to prepare an audio/video presentation of 5 minutes and upload it to Moodle shell. The on-campus students need to present for approximately 30 minutes on one of the following topics. Groups need to self-organise in earlier weeks and choose a topic in-class (Online students need to inform the course coordinator via email). Tutors will ensure that no two groups have the same topic. This task requires you to create a Kali hacking tools presentation by researching, experimenting with, and explaining hacking tools features. After completing this task, you should be able to use built in tools in Linux Kali to do vulnerability testing for the systems.

You should select one tool from the following list (if you want to select any other tool from Kali, please discuss with tutor):
• Hydra
• Maltego
• NMap
• Zed Attack Proxy
• SqlMap
• Metasploit Framework
• Burp Suite

You are required to investigate your selected tool and explain the syntax of commands you use. Your presentation must include at least 6 screenshots that demonstrate different features of the tool. Your presentation should be sufficiently detailed to enable audiences to be able to use the tool. You can prepare the presentation on the selected tool containing following headings.
1. Introduction of the tool
2. Features of the tool
3. Techniques used by the tool to exploit vulnerabilities of information systems
4. Experimental setup and evidence of usage of the tool. Include screenshots of vulnerability testing.
5. Shortcomings of the tool and possible improvements
6. Conclusions
7. References

Presentations will be 5 minutes, multiplied by the number of people in your group. If there are more groups than topics, then topics can be done by more than one group, at the tutor's discretion.

Groups must contain either 4 or 5 students as default - if a small group is formed (e.g., having two students remaining), then the tutor will rebalance the groups to ensure that there are no "small" groups. Only in exceptional cases will groups of a different size be allowed.

See the scoring sheet for this assignment, which is on the next page, and ensure that your presentation fulfils the criteria listed. All students in the same group get the same mark for "Contents", while "Presentation" marks are assigned individually. Your final mark is the sum of the two.

Reference no: EM133157134

Questions Cloud

Essential functions to gain a competitive advantage : Discuss in detail three human resources functions and apply each of them, in detail to a hospitality company of your choosing and also discuss how management ca
What should ben do to prepare the budget for the year : Ben's partner disagrees with the estimate and expects closer to 60,000 hours. What should Ben do to prepare the budget for the year
Explain what a debt covenant is : Explain what a debt covenant is, and give a specific example of a debt covenant. Address how debt covenants benefit both creditors and debtors of loan agreement
Calculate project npv for each company : Company A has substantial accumulated tax losses and is unlikely to pay taxes in the foreseeable future. Calculate project NPV for each company
Create a kali hacking tools presentation : Create a Kali hacking tools presentation by researching, experimenting with, and explaining hacking tools features
What is the nominal rate of interest : If the inflation rate is -5% and the real rate of interest is 8%, what is the nominal rate of interest
How will your investment in acme corp change : How will your investment in Acme Corp. change if you currently own 1000 shares valued at $10 each and Acme has just declared a 20 percent stock dividend
What average annual return : During the period from 2011 through 2015 the annual returns on small US stocks were -3.72 percent, What average annual return
Design your own network in packet tracer : Create appropriate frameworks and standards for network implementation and Apply concepts and theories of human factors as related to network design

Reviews

Write a Review

Other Subject Questions & Answers

  How you might utilize crisis or risk communication

Generally speaking, risk communication is the exchange of information with communities, cultures, or social systems about the type and magnitude of certain.

  Discuss the overall process of developing new software

Discuss the overall process of developing new software. Please note the differences between software development and methods.

  Evaluates the strategic plan from the scottsdale police

Review the City of Scottsdale Police Department Strategic Plan and the City of Scottsdale Police Department 2016 Crime Statistics and Crime Clock.

  Why do you think the writer chose approach to communication

Discuss the idea of catharsis and whether you think soldier writers benefit, or not, by communicating their experiences and feelings in memoirs, poems, and other narrative accounts. Do you see any potential drawbacks?

  Presentation on Radiography of the Equine Foot

Need a article and presentation need it to be written from certified articles and the name of presentation is " Radiography of the Equine Foot"

  What was the cause of the patient hypertension

At what point would the BUN and creatinine have signified the need for dialysis? What was the cause of the patient's hypertension?

  Believers have an obligation to live - true or false

For those who have been called according to His (God's) purpose, God works all things for the good of those who love Him. - True or False

  What are the strategies for incorporating tracer methods

Offer three strategies for incorporating tracer methods in a healthcare facility. In your strategies, be sure to involve nursing staff, providers.

  How would you feel if google implemented this concept

In terms of customer's paying to use Twitter, what do you think of the "buy up" concept. That works well with game programs

  Analyze of the following issues- fraternities and sororities

Use all three perspectives (functionalism, conflict, and interactionism) to analyze one of the following issues: Fraternities and sororities, social networking sites, or employer/employee relations. Write a 700- to 1,050-word essay that includes di..

  How can refine practice to meet community

Contrast two (2) specific populations in your practice that are affected by the above issue(s) or disease(s) by listing their commonalities

  Industry or individuals working in specific environment

Discuss the top three threats that face the industry or individuals working in the specific environment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd