Ethical hacking and defence presentation

Assignment Help Computer Network Security
Reference no: EM132990153

Ethical Hacking and Defence Presentation

Task:

You are required to present/demonstrate your process (steps taken) to find the five hidden flags in the given Pen-Testing Investigation (Case Study) machine. Make the whole process in a video to explain each command. While demonstrating the system compromise, you must:

1. use appropriate tools and a legitimate ethical hacking process.

2. compromise the system over the network.

3. provide a walkthrough of the system compromise clearly specifying each step undertaken to find and exploit the vulnerabilities and the hidden flags. During the demonstration, you must explain/narrate the rationale for each command used with arguments/ procedures adopted/ use of tools (such as nmap/ John the Ripper/ Nikto/ Weevely, etc.) to communicate your knowledge. Using just the commands/ procedures/ tools without appropriate explanation will result in significant loss of marks.

4. Summarise your findings by giving a brief overview of:
a. all the vulnerabilities found (whether they were exploited or not) in the supplied system.
b. critical information uncovered during the entire process.
c. the possible recommendations against each of the identified vulnerabilities.
The following is a checklist of the flow of the presentation:

Objective Outline the aims and objectives of the presentation. Provide:
• the purpose of the presentation
• an overview of the content covered/flow/sequence of the presentation

You can use a PowerPoint slide for this information as a primary capture.

Task Demonstrate and discuss the requirements specified in the Task section above. This section should take up the maximum of the duration of your presentation. Be creative so that you engage the audience's attention. You can ONLY use the PowerPoint slide for Task 4.

Conclude your presentation with a thank you slide informing the audience about how did you find the ethical hacking journey specific to the supplied system.

Attachment:- Ethical Hacking and Defence.rar

Reference no: EM132990153

Questions Cloud

How the covid pandemic impacts the shares of the company : How the Covid-19 pandemic impacts the shares of the company. Assume that you work as a research assistant of a middle manager of BHP Group ltd.
What do think is necessary to prevent type of fraud : What do you think is necessary to prevent or at least minimize this type of fraud? Review the latest ACFE's Report to the Nations on Occupational Fraud
Leadership void is being felt throughout corporate america : With baby-boomer employees retiring rapidly the leadership void is being felt throughout corporate America.
What does mean that cl is considered to have significant : What does it mean that CL is considered to have significant influence over BL? On 1 July 2019, Cordon Ltd (CL) acquired a 20 per cent interest in Bleu Ltd (BL).
Ethical hacking and defence presentation : Ethical Hacking and Defence Presentation - find the five hidden flags in the given Pen-Testing Investigation (Case Study) machine. Make the whole process
Favorite medium in painting or drawing : What is your favorite medium in painting or drawing? discuss the advantages and disadvantages of using that medium.
Explain the current status of the financial position : Explain the current status of their financial position (Using numbers and facts always helps). How do they react to the coronavirus?
What are the ethical and scientific integrity issues : Compare the difference between theory, research, and practice in nursing. What are the ethical and scientific integrity issues related to the research?
Find expected cost savings for the coming year : Compute its expected cost savings for the coming year. Hillshire Company's budgeted sales and budgeted cost of goods sold for the coming year are $129,870,000.

Reviews

len2990153

9/15/2021 11:27:31 PM

Pen-Testing Investigation uses appropriate tools and a legitimate ethical hacking process. Compromise the system over the network. clearly specifying each step undertaken to find and exploit the vulnerabilities and the hidden flags. Summarise your findings by giving a brief overview of: a. all the vulnerabilities found (whether they were exploited or not) in the supplied system. b. critical information uncovered during the entire process. c. the possible recommendations against each of the identified vulnerabilities.

Write a Review

Computer Network Security Questions & Answers

  Discuss thoroughly vpns and how they are implemented

Discuss thoroughly VPNs and how they are implemented and Discuss both symmetric and asymmetric cryptographic algorithms. Also, explain cryptographic tools. Which should FDU consider

  Discuss the major networking building blocks

Discuss the major networking building blocks and their functions. Secondly, discuss software applications'' vulnerabilities, such as those found in web browsers.

  Differentiate between logical and physical security

For this 3-5 page paper, provide an overview of the need for and history of data security differentiate between logical and physical security

  Compare and contrast frequency spectrum and bandwidth

How is information sent across a transmission medium from the physical layer? Compare and contrast frequency spectrum and bandwidth.

  What is the electronic communications privacy act

What is the Electronic Communications Privacy Act (ECPA) of 1986? Please use outside resources to assist with your answer - Research the United States v. Councilman Case. Why was this case important to the history of the Electronic Communications P..

  The edp audit control and security

The EDP Audit, Control, and Security - Document related to IT governance, compliance,controls, or audit and report on it

  Describe the equipment present in a forensic toolkit

Discuss the presearch activities that need to be addressed during a computer investigation. Briefly summarize each step. Describe the equipment present in a forensic toolkit.

  Review the sites terms of use and privacy policy

Review the site's terms of use and privacy policy, if any. Are these clear and easily understood, or are they written in legalese?

  Differences between a network and a stand-alone environment

Describe at least 4 differences between a network and a stand-alone environment which make a network more vulnerable to security attacks

  Assignment - Create and Delete Files on USB Drive

Create and Delete Files on USB Drive. Comparison of the digital forensics tools that you used in this work. Demonstration of two digital forensics tools

  Provide a historical timeline of homeland security events

Provide a historical timeline of homeland security incidents along with the call for improved preparedness, response and recovery needs that lead to the creation of National Incident Management Systems and the National Response Framework documents..

  What is happening now in terms of privacy on the web

Privacy on the Web: What is happening now in terms of privacy on the Web? Think about recent abuses and improvements.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd