Discuss how you will perform penetration testing

Assignment Help Computer Network Security
Reference no: EM132364496

Demonstration of penetration testing tools

Purpose of the assessment (with ULO Mapping)

Students should be able to demonstrate their achievements in the following unit learning outcomes:

a. Implement and evaluate security testing tools in a realistic computing environment

Assignment Description

For this assignment, you will evaluate two password cracking tools and write a report with video presentation on how you will perform penetration testing on the eCommerce platform and Linux-based FTP webserver to identify their security vulnerabilities and breaches.

Marks will be awarded based on the sophistication and the difficulties the demonstration explored.

Your task is to complete and make a video presentation and writing a report on the following:

1. Download and install (on your computer or on MIT Virtual box) any two of the password cracking tools from Table 1.

2. Outline of your presentation should include description of the tools.

3. Demonstrate how to use these tools to crack the password. Your demonstration should include:
i. Discussion on the password cracking counter Measures, and
ii. Explanation of how to use these tools to crack the password.

4. Comparison of the tools that you used in this work. Your comparison could include:

i. Time is taken to crack the password
ii. Ease of usage

5. Analyse the following scenarios and give your opinion on which of the tools that you investigated could be more suitable for these scenarios. In your analysis, please consider the following:

i. Discuss how you will perform penetration testing on the eCommerce platform and Linux-based FTP webserver to identify their security vulnerabilities and breaches.

6. You should appear in the video at the first and last 30 secs to introduce yourself and draw a conclusion on your experience with the security tool.

Case Scenario: Your client is Mr. Daniel Gromer who runs a chain of clothing shops in Australia. Mr Gromer runs over 50 clothing shops in Sydney and Melbourne targeting female customers in their early twenties with moderate budget. Mr. Gromer has recently taken an interest in online business as he realized that many of his competitions have moved onto the online platforms reducing their expenditure significantly. Mr. Gromer has hired a team of web developers (located overseas) to develop and their new online shop is ready to launch in May 2019. Mr. Gromer has no IT background but he is aware of many cases where the websites were hijacked and lost fortunes alongside ruining their digital reputations.

Mr. Gromer has approached the PureHacking.com to assess his new eCommerce website and report any vulnerabilities ahead of its launch as Mr. Gromer is aware that he may get only one chance at the online success and if the website security is breached, he can face major loss in his investment.

Mr. Gromer informs: his eCommerce website is using WooCommerce plugin implemented on the WordPress website platform and the entire website is running on Linux webserver. The website developers have been using FTP to upload the website contents to the Linux webserver.

Length of Video: Introduction (30 secs approximately, your appearance should be in the video) + Outline of the presentation (30 secs approximately) + Demonstration of the task (260 seconds approximately) + Comparison of the Tools (30 seconds approximately) +Analysis of the scenario (40 secs approximately) + Conclusion (30 secs approximately, with appearance). The total length of the presentation should not more than 8 minutes (mark would be deducted for over-length presentation).

Table 1: Password cracking tools

Serial #

Name of the password cracking tool

1

John the Ripper

2

Rainbowcrack

3

Cain & Abel

4

Ophcrack

You may use any of the available open source software for screen capture.

Attachment:- Demonstration of penetration testing tools.rar

Reference no: EM132364496

Questions Cloud

Discuss how globalization has changed jobs : Discuss how globalization has changed jobs in an organization where you have worked. What are some HR responses to those changes?
Participate in the information systems decisions : Why do managers need to understand and participate in the information systems decisions of their organizations?
We are living at time when technology is advancing at pace : We are living at a time when technology is advancing at a pace that some believe is too fast for humans to truly understand the implications these advances
Name another company in the same industry : Name another company in the same industry as General Electric (GE) that provides benefits to multiple stakeholders
Discuss how you will perform penetration testing : MN623 - Cyber Security and Analytics - Demonstration of penetration testing tools - Discussion on the password cracking counter Measures
Find the value of the bond if the required return : Midland Utilities has a bond issue outstanding that will mature to its $1000 par value in 12 years. The bond has a coupon rate of 11% and pays interest annually
Graded assignments : Graded Assignments may be found at the end of each chapter of the required textbook under the title "Real-World Exercises".
Describe the situations and problem that colleen encounters : MGMT1135 Organisational Behaviour Assignment - Case Study, The University of Western Australia. Describe the situations and problem that Colleen encounters
Discuss at least five tips that stood out to you and why : What questions to ask. Asking only what is relevant. Avoiding double-barreled questions. Avoiding leading questions and sensitive questions.

Reviews

len2364496

9/2/2019 1:36:28 AM

Section to be included in the report Description of the section Marks Introduction Student should introduce with his/her physical appearance in the video. 10 Outline Outline of the whole presentation including tool description. 5 Demonstration Demonstrate (narration of your actions recorded by video) all steps from the respective project. 30 Comparison Compare the two tools investigated. 10 Analysis Analysis of the scenario. 15 Penetration test Identifying vulnerabilities in Web and FTP server 15 Conclusion Draw a conclusion on your experience with the Security Software. 10 Reference style 5 Total 100

len2364496

9/2/2019 1:36:21 AM

Submission Guidelines: 1. Name your video with your student number and name. 2. Upload Video on your Youtube account 3. Copy the Video Link to a file (word document) and 4. Upload it into the MOODLE To upload on Youtube, you must create your account on youtube. If you have a google account (gmail), you already have one on youtube. Videos must be of one of the following formats: .MOV, .MPEG4, MP4, .AVI, .WMV, .MPEGPS, .FLV, .3GPP, and .WebM. Once you have an account, to upload your video, click on the 'upload' button located at the top right-hand corner of your youtube.com webpage. To keep your uploaded video unsearchable by people so that random people cannot view your video(s), you have to select the privacy mode from the drop-down menu on the upload screen to be ‘Unlisted’. This way, your video is viewable by only those who have got the URL of your video. Make sure you copy and paste your video URL in the file submitted on MOODLE for your marker to be able to watch and mark it!

len2364496

9/2/2019 1:36:06 AM

Due Date 11:55 PM Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style

len2364496

9/2/2019 1:35:54 AM

one video capture presentation with two demonstration tools of password cracking which mentioned in detail and other writing report and please follow properly markeing criteria and requirement of assignmnet

Write a Review

Computer Network Security Questions & Answers

  Which displacement produces largest number of coincidences

Use displacements of 5 and 6. Which displacement produces the largest number of coincidences? Find the key. Find the plaintext.

  Discuss your experiences with cyber-bullying

Discuss your experiences with cyber-bullying - either a personal experience or one you know of from peers or the media.

  Managing the information security risks of the organisation

COIT20263 Information Security Management Written Assessment. Produce a report that discusses the guidelines for managing the information security risks

  Extract the password hashes from a machine

Extract the password hashes from a machine

  Define ethics for the information age

Define ethics for the information age; cite your sources. You may use any original works but may not discuss your answers with fellow classmates.

  What is the principle of adequate protection

What is the principle of adequate protection? Do you agree with the principle? What difficulties are associated with implementing it?

  A determine the elements of the risk management framework b

to foster and develop national preparedness and encourage the exploration of risk related interdependencies across the

  Incident and crime scene procedures

Determine the purpose of creating a digital hash. Explain in detail the need for this procedure and the potential damage if this critical step is not taken.

  Determine the greatest security challenge

Determine the greatest security challenge that a network administrator might encounter when troubleshooting issues in secured networks

  Discuss the various cyber and cybersecurity roles

The focus on the 9/11 Commission and DHS when formed was primarily to protect physical infrastructure (and people) against terrorist attacks.

  What are two ways of providing authentication in ipsec

What is an IPsec security association? What are two ways of providing authentication in IPsec?

  Write a reflection report about the role cryptography

Determine what the risk to an organisation is, you need to know what the problems could be - Write a reflection report in 100 words about the role cryptography

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd