Ethical hacking and defence presentation

Assignment Help Computer Network Security
Reference no: EM132990153

Ethical Hacking and Defence Presentation

Task:

You are required to present/demonstrate your process (steps taken) to find the five hidden flags in the given Pen-Testing Investigation (Case Study) machine. Make the whole process in a video to explain each command. While demonstrating the system compromise, you must:

1. use appropriate tools and a legitimate ethical hacking process.

2. compromise the system over the network.

3. provide a walkthrough of the system compromise clearly specifying each step undertaken to find and exploit the vulnerabilities and the hidden flags. During the demonstration, you must explain/narrate the rationale for each command used with arguments/ procedures adopted/ use of tools (such as nmap/ John the Ripper/ Nikto/ Weevely, etc.) to communicate your knowledge. Using just the commands/ procedures/ tools without appropriate explanation will result in significant loss of marks.

4. Summarise your findings by giving a brief overview of:
a. all the vulnerabilities found (whether they were exploited or not) in the supplied system.
b. critical information uncovered during the entire process.
c. the possible recommendations against each of the identified vulnerabilities.
The following is a checklist of the flow of the presentation:

Objective Outline the aims and objectives of the presentation. Provide:
• the purpose of the presentation
• an overview of the content covered/flow/sequence of the presentation

You can use a PowerPoint slide for this information as a primary capture.

Task Demonstrate and discuss the requirements specified in the Task section above. This section should take up the maximum of the duration of your presentation. Be creative so that you engage the audience's attention. You can ONLY use the PowerPoint slide for Task 4.

Conclude your presentation with a thank you slide informing the audience about how did you find the ethical hacking journey specific to the supplied system.

Attachment:- Ethical Hacking and Defence.rar

Reference no: EM132990153

Questions Cloud

How the covid pandemic impacts the shares of the company : How the Covid-19 pandemic impacts the shares of the company. Assume that you work as a research assistant of a middle manager of BHP Group ltd.
What do think is necessary to prevent type of fraud : What do you think is necessary to prevent or at least minimize this type of fraud? Review the latest ACFE's Report to the Nations on Occupational Fraud
Leadership void is being felt throughout corporate america : With baby-boomer employees retiring rapidly the leadership void is being felt throughout corporate America.
What does mean that cl is considered to have significant : What does it mean that CL is considered to have significant influence over BL? On 1 July 2019, Cordon Ltd (CL) acquired a 20 per cent interest in Bleu Ltd (BL).
Ethical hacking and defence presentation : Ethical Hacking and Defence Presentation - find the five hidden flags in the given Pen-Testing Investigation (Case Study) machine. Make the whole process
Favorite medium in painting or drawing : What is your favorite medium in painting or drawing? discuss the advantages and disadvantages of using that medium.
Explain the current status of the financial position : Explain the current status of their financial position (Using numbers and facts always helps). How do they react to the coronavirus?
What are the ethical and scientific integrity issues : Compare the difference between theory, research, and practice in nursing. What are the ethical and scientific integrity issues related to the research?
Find expected cost savings for the coming year : Compute its expected cost savings for the coming year. Hillshire Company's budgeted sales and budgeted cost of goods sold for the coming year are $129,870,000.

Reviews

len2990153

9/15/2021 11:27:31 PM

Pen-Testing Investigation uses appropriate tools and a legitimate ethical hacking process. Compromise the system over the network. clearly specifying each step undertaken to find and exploit the vulnerabilities and the hidden flags. Summarise your findings by giving a brief overview of: a. all the vulnerabilities found (whether they were exploited or not) in the supplied system. b. critical information uncovered during the entire process. c. the possible recommendations against each of the identified vulnerabilities.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd