Reference no: EM132731686 , Length: word count:3000
Scenario:
You are working as certified junior ethical hacker in a company called "TechTex". Your company wants you to train and create an awareness on cyber threats to some of the non-IT members of staff. For this awareness program, you need to setup a Metasploit system (preferably a Kali installed System) and another system (such as Windows or Linux) that will act as Metasploitable to use as part of your training/awareness program.
Task 1
You need to create/develop a virtual environment such as Virtual Box or VMWare. Use virtual machine images such as Kali VMware to create a Metasploit system and create another virtual machine as Metasploitable system (i.e. either Windows or Linux environment).
Task 2
Your developed system should be able to perform different ethical hacking methods to demonstrate how hackers generally carry out different steps in order to find vulnerabilities in companies' network systems.
A. The easiest way for hackers to get into an organisation's network is by scanning WiFi network and getting WiFi password. You are required to demonstrate the steps hackers perform in order to get the Wi-Fi password.
B. After getting successful in finding Wi-Fi password, demonstrate the steps hacker can perform network scanning using any appropriate tools (such as Namp/Zenmap) and analyse their results.
C. Perform a Man in the Middle attack to demonstrate how hackers can sniff, analyse, and steal sensitive data from HTTP packets.
D. If your organisation's systems are using HTTPS for internet communication, to what extend is it possible for hackers to penetrate the system and get sensitive data? Demonstrate the process and provide solutions to counteract those threats.
E. Demonstrate how hackers can use social-engineering tools to carry out their attacks.
Task 3
Your Company's managers are now worried about the Covid-19 fraud and scams within the organisation with the use of social engineering tools. To that end, you are required to develop a security policy for your company that will address the use of wireless network within the premises for employees and visitors.
Task 4
• Conclusion
• Overall recommendations:
- On implementations on potential solutions in task 2
- On how task 3 can be implemented
• Reference List
Total 2600 words to 3000 words
Suggested requirements for the assignment:? Metasploit system (preferably a Kali), Virtual Box or VMWare, Namp/Zenmap, airmon-ng, airodump-ng, aircrack-ng
What is bad boys inc cost of capital
: If Bad Boys, Inc. raises capital using 30% debt, 5% preferred stock, and 65% common stock, what is Bad Boys, Inc.'s cost of capital?
|
Effective monthly interest rate for mortgage
: The quoted fixed mortgage rate is 2.20% compounded semiannually. What is the effective monthly interest rate for this mortgage?
|
Post an analysis of the dimensions of oppression
: Post an analysis of the dimensions of oppression and marginalization that might impact your future clients. Be specific in identifying the types of clients.
|
Find out the retirement account
: If both you and your employer continue to do and you can earn an effective monthly rate of 0.70%, how much will you have in your retirement account 39 years fro
|
Develop a virtual environment such as virtual box
: develop a virtual environment such as Virtual Box or VMWare. Use virtual machine images such as Kali VMware to create a Metasploit system
|
Calculate the project''s profitability index
: If the rate of return is 14.25%, calculate the project's profitability index.
|
Computing the yield to maturity
: Your company has just issued, at par, new $1,000 bonds with a maturity of 5 years and a semi-annual coupon of $40 per bond. What is the yield to maturity
|
Analyze the case using a systems approach
: Analyze the case using a systems approach, taking into consideration both family and community systems. Complete and submit the "Dissecting a Theory.
|
Calculate the amount in euro
: The following spot rates are expressed in Canadian currency.
|