Reference no: EM132990153
Ethical Hacking and Defence Presentation
Task:
You are required to present/demonstrate your process (steps taken) to find the five hidden flags in the given Pen-Testing Investigation (Case Study) machine. Make the whole process in a video to explain each command. While demonstrating the system compromise, you must:
1. use appropriate tools and a legitimate ethical hacking process.
2. compromise the system over the network.
3. provide a walkthrough of the system compromise clearly specifying each step undertaken to find and exploit the vulnerabilities and the hidden flags. During the demonstration, you must explain/narrate the rationale for each command used with arguments/ procedures adopted/ use of tools (such as nmap/ John the Ripper/ Nikto/ Weevely, etc.) to communicate your knowledge. Using just the commands/ procedures/ tools without appropriate explanation will result in significant loss of marks.
4. Summarise your findings by giving a brief overview of:
a. all the vulnerabilities found (whether they were exploited or not) in the supplied system.
b. critical information uncovered during the entire process.
c. the possible recommendations against each of the identified vulnerabilities.
The following is a checklist of the flow of the presentation:
Objective Outline the aims and objectives of the presentation. Provide:
• the purpose of the presentation
• an overview of the content covered/flow/sequence of the presentation
You can use a PowerPoint slide for this information as a primary capture.
Task Demonstrate and discuss the requirements specified in the Task section above. This section should take up the maximum of the duration of your presentation. Be creative so that you engage the audience's attention. You can ONLY use the PowerPoint slide for Task 4.
Conclude your presentation with a thank you slide informing the audience about how did you find the ethical hacking journey specific to the supplied system.
Attachment:- Ethical Hacking and Defence.rar