Develop a virtual environment such as virtual box

Assignment Help Other Subject
Reference no: EM132731686 , Length: word count:3000

Scenario:
You are working as certified junior ethical hacker in a company called "TechTex". Your company wants you to train and create an awareness on cyber threats to some of the non-IT members of staff. For this awareness program, you need to setup a Metasploit system (preferably a Kali installed System) and another system (such as Windows or Linux) that will act as Metasploitable to use as part of your training/awareness program.

Task 1
You need to create/develop a virtual environment such as Virtual Box or VMWare. Use virtual machine images such as Kali VMware to create a Metasploit system and create another virtual machine as Metasploitable system (i.e. either Windows or Linux environment).

Task 2
Your developed system should be able to perform different ethical hacking methods to demonstrate how hackers generally carry out different steps in order to find vulnerabilities in companies' network systems.
A. The easiest way for hackers to get into an organisation's network is by scanning WiFi network and getting WiFi password. You are required to demonstrate the steps hackers perform in order to get the Wi-Fi password.
B. After getting successful in finding Wi-Fi password, demonstrate the steps hacker can perform network scanning using any appropriate tools (such as Namp/Zenmap) and analyse their results.
C. Perform a Man in the Middle attack to demonstrate how hackers can sniff, analyse, and steal sensitive data from HTTP packets.
D. If your organisation's systems are using HTTPS for internet communication, to what extend is it possible for hackers to penetrate the system and get sensitive data? Demonstrate the process and provide solutions to counteract those threats.
E. Demonstrate how hackers can use social-engineering tools to carry out their attacks.

Task 3
Your Company's managers are now worried about the Covid-19 fraud and scams within the organisation with the use of social engineering tools. To that end, you are required to develop a security policy for your company that will address the use of wireless network within the premises for employees and visitors.

Task 4
• Conclusion
• Overall recommendations:
- On implementations on potential solutions in task 2
- On how task 3 can be implemented
• Reference List

Total 2600 words to 3000 words

Suggested requirements for the assignment:? Metasploit system (preferably a Kali), Virtual Box or VMWare, Namp/Zenmap, airmon-ng, airodump-ng, aircrack-ng

Reference no: EM132731686

Questions Cloud

What is bad boys inc cost of capital : If Bad Boys, Inc. raises capital using 30% debt, 5% preferred stock, and 65% common stock, what is Bad Boys, Inc.'s cost of capital?
Effective monthly interest rate for mortgage : The quoted fixed mortgage rate is 2.20% compounded semiannually. What is the effective monthly interest rate for this mortgage?
Post an analysis of the dimensions of oppression : Post an analysis of the dimensions of oppression and marginalization that might impact your future clients. Be specific in identifying the types of clients.
Find out the retirement account : If both you and your employer continue to do and you can earn an effective monthly rate of 0.70%, how much will you have in your retirement account 39 years fro
Develop a virtual environment such as virtual box : develop a virtual environment such as Virtual Box or VMWare. Use virtual machine images such as Kali VMware to create a Metasploit system
Calculate the project''s profitability index : If the rate of return is 14.25%, calculate the project's profitability index.
Computing the yield to maturity : Your company has just issued, at par, new $1,000 bonds with a maturity of 5 years and a semi-annual coupon of $40 per bond. What is the yield to maturity
Analyze the case using a systems approach : Analyze the case using a systems approach, taking into consideration both family and community systems. Complete and submit the "Dissecting a Theory.
Calculate the amount in euro : The following spot rates are expressed in Canadian currency.

Reviews

Write a Review

Other Subject Questions & Answers

  Analysis of the ramifications of an organization

Post an analysis of the ramifications of an organization not involving nurses in each stage of the systems development life cycle when purchasing and implementing a new HIT system

  Contexts values code collectivism

Cummunication tendencies of india cultural charateristics (contexts values code collectivism, uncertainty advoiadnace power distance etc)values family interpet describe compare similaritys differences to american

  Is whitewashing a colorblind approach

Is whitewashing a colorblind approach? Does it perpetuate racial inequality by implying that the perceptions or awareness of the majority

  What are the benefits of integrating both types of data

Qualitative and quantitative data are both important as they offer different ways of looking at student progress and engagement in the learning process.

  Assignment - Critical Analysis of the medical technologies

Assignment - Critical Analysis. Provide a critical analysis of the medical technologies being assessed. Appraise and evaluate the defined objective of article

  Explian what threats from crime or terrorism

Explian what threats from crime or terrorism that airports and airlines face at the present time. In your view which provide the greatest threat and why?

  Why are they so effective in maintaining social order

How do sanctions work? Why are they so effective in maintaining social order? Stand backward in an elevator or in a line.

  How are patient outcomes with access to this expertise

How are patient outcomes with access to this expertise? How do they track revenue, is there a discount or full Charge Master Invoice?

  How are they significant to american culture

Think about why you are choosing them. What is their significance? More specifically, how are they significant to American culture? How do you interpret the images? You might choose two images that are similar or you could decide to compare two se..

  What type of sampling method is used

How will the sample be selected? What type of sampling method is used? Is it appropriate to the design? Does the sample reflect the population as identified in the problem or purpose statement

  What are some of the difficult aspects of documentation

Write 3-4 Pages. Papers will apply the topic to your work at your site, not theoretical or conceptual. Be sure to clearly respond to all parts of the prompts.

  Identify the two political issues

Identify the two political issues. These should be real and contain details. For example, in Denver, the legalization of marijuana has impacted

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd