Discuss how you will perform penetration testing

Assignment Help Computer Network Security
Reference no: EM132364496

Demonstration of penetration testing tools

Purpose of the assessment (with ULO Mapping)

Students should be able to demonstrate their achievements in the following unit learning outcomes:

a. Implement and evaluate security testing tools in a realistic computing environment

Assignment Description

For this assignment, you will evaluate two password cracking tools and write a report with video presentation on how you will perform penetration testing on the eCommerce platform and Linux-based FTP webserver to identify their security vulnerabilities and breaches.

Marks will be awarded based on the sophistication and the difficulties the demonstration explored.

Your task is to complete and make a video presentation and writing a report on the following:

1. Download and install (on your computer or on MIT Virtual box) any two of the password cracking tools from Table 1.

2. Outline of your presentation should include description of the tools.

3. Demonstrate how to use these tools to crack the password. Your demonstration should include:
i. Discussion on the password cracking counter Measures, and
ii. Explanation of how to use these tools to crack the password.

4. Comparison of the tools that you used in this work. Your comparison could include:

i. Time is taken to crack the password
ii. Ease of usage

5. Analyse the following scenarios and give your opinion on which of the tools that you investigated could be more suitable for these scenarios. In your analysis, please consider the following:

i. Discuss how you will perform penetration testing on the eCommerce platform and Linux-based FTP webserver to identify their security vulnerabilities and breaches.

6. You should appear in the video at the first and last 30 secs to introduce yourself and draw a conclusion on your experience with the security tool.

Case Scenario: Your client is Mr. Daniel Gromer who runs a chain of clothing shops in Australia. Mr Gromer runs over 50 clothing shops in Sydney and Melbourne targeting female customers in their early twenties with moderate budget. Mr. Gromer has recently taken an interest in online business as he realized that many of his competitions have moved onto the online platforms reducing their expenditure significantly. Mr. Gromer has hired a team of web developers (located overseas) to develop and their new online shop is ready to launch in May 2019. Mr. Gromer has no IT background but he is aware of many cases where the websites were hijacked and lost fortunes alongside ruining their digital reputations.

Mr. Gromer has approached the PureHacking.com to assess his new eCommerce website and report any vulnerabilities ahead of its launch as Mr. Gromer is aware that he may get only one chance at the online success and if the website security is breached, he can face major loss in his investment.

Mr. Gromer informs: his eCommerce website is using WooCommerce plugin implemented on the WordPress website platform and the entire website is running on Linux webserver. The website developers have been using FTP to upload the website contents to the Linux webserver.

Length of Video: Introduction (30 secs approximately, your appearance should be in the video) + Outline of the presentation (30 secs approximately) + Demonstration of the task (260 seconds approximately) + Comparison of the Tools (30 seconds approximately) +Analysis of the scenario (40 secs approximately) + Conclusion (30 secs approximately, with appearance). The total length of the presentation should not more than 8 minutes (mark would be deducted for over-length presentation).

Table 1: Password cracking tools

Serial #

Name of the password cracking tool

1

John the Ripper

2

Rainbowcrack

3

Cain & Abel

4

Ophcrack

You may use any of the available open source software for screen capture.

Attachment:- Demonstration of penetration testing tools.rar

Reference no: EM132364496

Questions Cloud

Discuss how globalization has changed jobs : Discuss how globalization has changed jobs in an organization where you have worked. What are some HR responses to those changes?
Participate in the information systems decisions : Why do managers need to understand and participate in the information systems decisions of their organizations?
We are living at time when technology is advancing at pace : We are living at a time when technology is advancing at a pace that some believe is too fast for humans to truly understand the implications these advances
Name another company in the same industry : Name another company in the same industry as General Electric (GE) that provides benefits to multiple stakeholders
Discuss how you will perform penetration testing : MN623 - Cyber Security and Analytics - Demonstration of penetration testing tools - Discussion on the password cracking counter Measures
Find the value of the bond if the required return : Midland Utilities has a bond issue outstanding that will mature to its $1000 par value in 12 years. The bond has a coupon rate of 11% and pays interest annually
Graded assignments : Graded Assignments may be found at the end of each chapter of the required textbook under the title "Real-World Exercises".
Describe the situations and problem that colleen encounters : MGMT1135 Organisational Behaviour Assignment - Case Study, The University of Western Australia. Describe the situations and problem that Colleen encounters
Discuss at least five tips that stood out to you and why : What questions to ask. Asking only what is relevant. Avoiding double-barreled questions. Avoiding leading questions and sensitive questions.

Reviews

len2364496

9/2/2019 1:36:28 AM

Section to be included in the report Description of the section Marks Introduction Student should introduce with his/her physical appearance in the video. 10 Outline Outline of the whole presentation including tool description. 5 Demonstration Demonstrate (narration of your actions recorded by video) all steps from the respective project. 30 Comparison Compare the two tools investigated. 10 Analysis Analysis of the scenario. 15 Penetration test Identifying vulnerabilities in Web and FTP server 15 Conclusion Draw a conclusion on your experience with the Security Software. 10 Reference style 5 Total 100

len2364496

9/2/2019 1:36:21 AM

Submission Guidelines: 1. Name your video with your student number and name. 2. Upload Video on your Youtube account 3. Copy the Video Link to a file (word document) and 4. Upload it into the MOODLE To upload on Youtube, you must create your account on youtube. If you have a google account (gmail), you already have one on youtube. Videos must be of one of the following formats: .MOV, .MPEG4, MP4, .AVI, .WMV, .MPEGPS, .FLV, .3GPP, and .WebM. Once you have an account, to upload your video, click on the 'upload' button located at the top right-hand corner of your youtube.com webpage. To keep your uploaded video unsearchable by people so that random people cannot view your video(s), you have to select the privacy mode from the drop-down menu on the upload screen to be ‘Unlisted’. This way, your video is viewable by only those who have got the URL of your video. Make sure you copy and paste your video URL in the file submitted on MOODLE for your marker to be able to watch and mark it!

len2364496

9/2/2019 1:36:06 AM

Due Date 11:55 PM Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style

len2364496

9/2/2019 1:35:54 AM

one video capture presentation with two demonstration tools of password cracking which mentioned in detail and other writing report and please follow properly markeing criteria and requirement of assignmnet

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd