Evaluate password cracking tools in Kali Linux

Assignment Help Computer Networking
Reference no: EM132507009

MN623 - Cyber Security and Analytics Assignment - Melbourne Institute of Technology, Australia

Assessment Title - Implementation and Evaluation of Penetration Testing Tools

Purpose of the assessment (with ULO Mapping) - This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

Implement and evaluate security testing tools in a realistic computing environment.

Purpose of the Assignment - The Assignment1 focuses on implementing and evaluating security testing tools in a realistic computing environment. It helps the students to learn how to perform hacking/penetration testing. The students will demonstrate how a target system works, the weaknesses in the system, how to exploit those weaknesses and hack the system, and how to secure the system from the discussed weaknesses.

By doing this assignment, students will learn to evaluate and applies contemporary intelligent cyber security solutions for enterprise use which will definitely act as a stimulus for work integrating learning. By the end of the assignment, the students will have a strong base and a good understanding of hacking/penetration testing, so they can be able to combine the techniques learnt and tailor them to suit different scenarios. This assignment will be a stepping stone for the students to be work force ready for the booming cyber security industry.

Assignment Specifications - For this Assignment, you will implement and evaluate 2 password cracking tools in Kali Linux and explore and evaluate 3 security scanners.

You have to write a report for Assignment 1a and for Assignment 1b, a report with video presentation on how you will perform and evaluate these penetration testing tools is required.

Assignment 1a: Implement and evaluate 2 password cracking tools in Kali Linux

Focus on the following points while making a report:

Demonstrate building a Software Test platform to evaluate 2 password cracking tools.

Why attack and Penetration Tools are important?

What are the attributes of Good Assessment Tool for Penetration Testing?

Assignment 1b: Explore and evaluate 3 Exploitation and Reverse Engineering security scanners

Focus on the following points while making a video presentation and report:

Addressing the feedback provided in Part 1 of the assignment.

Demonstrate understanding and implementation of Network Reconnaissance, Exploitation and Reverse Engineering security tools.

There are several security scanners available in the market. Justify why you choose to explore the 3 Exploitation and Reverse Engineering security scanners you will be evaluating? 5 Marks

The students will demonstrate how a target system works, the weaknesses in the system, how to exploit those weaknesses and hack the system, and how to secure the system from the discussed weaknesses.

You should demonstrate 3 security scanners in the video and draw a conclusion on your experience with the 3 security scanners you evaluated.

Attachment:- Assignment File - Penetration Testing Tools.rar

Reference no: EM132507009

Questions Cloud

Significant impact on gasoline consumption : Do you think that such an increase, reflected in the price of gasoline, would have a significant impact on gasoline consumption?
Medicare payroll tax with the social security payroll tax : Identify the category of tax that applies to payroll taxes and contrast the Medicare payroll tax with the Social Security payroll tax.
Regional tourism and hospitality promotion organization : As the manager of reputable resort hotel, what arguments would you use with your board of directors to obtain financial support for your local and regional
What are the reasons is more efficient : When making management decisions, is variable or absorption costing more efficient and what are the reasons it is more efficient?
Evaluate password cracking tools in Kali Linux : Explore and evaluate 3 Exploitation and Reverse Engineering security scanners. Demonstrate understanding and implementation of Network Reconnaissance
Short-run equilibrium output and the output gap : a) Calculate the short-run equilibrium output and the output gap.
What the business event would : Banton Company paid $8,000 cash for wages of production workers. This business event would. increase one asset account and decrease another asset account.
Short-run equilibrium output and the output gap : a) Calculate the short-run equilibrium output and the output gap.
What is the cost per bottle of hi-voltage : What is the cost per bottle of Hi-Voltage? What is the cost per bottle of EasySlim? Hint: The answer should draw on the total cost for each product line

Reviews

Write a Review

Computer Networking Questions & Answers

  Compute the result of an add immediate 150 instruction

Compute the result of an ADD IMMEDIATE 150 instruction and Compute the result of an ADD DIRECT 150 instruction

  What is the ip address of your dhcp server

What is the IP address of your DHCP server? Explain the purpose of the router and subnet mask lines in the DHCP offer message.

  Identify all the circuits and network hardware

Analyse user network requirements and describe and analyse the current network - You will need to identify all the circuits (cabling) and network hardware of the existing network(s) and explain their function, performance, capacity, etc.

  Write steps for computer in company browse site using url

Personel.mycompany.com in URL address box to browse this Web site. Write down steps do you take so that each computer in company can browse the site using URL?

  Explain the impact on an organization when using voip

What are some considerations an organization should look at when moving from a traditional phone system to VoIP? Explain the impact on an organization when using VoIP

  Compare four gui features of the chosen tool with wireshark

Students need to download, install, use and compare another free network performance. Compare at least four GUI features of the chosen tool with Wireshark.

  Review the given document hardware and networking plan

Review the given document :  "Hardware and networking plan ". - Data Center Facility Cost- Data Center Cloud or Other Services Contracts.

  How given needs collaborative benefit provided by the suite

Create a PPT about a cloud-based office productivity suite. Identify how each of the above need can be met and the collaborative benefits provided by the suite.

  Find some information about the given protocol

There is a routing protocol called HELLO, which we did not discuss in this chapter. Find some information about this protocol.

  Configure static routing on the isp router

ITNE2003 - Basic RIP Configuration - Examine the network requirements and What is the gateway of last resort in the routing table of the BRANCH router?

  Implement a networking in given building design

You need to implement a networking in given building design - Assume separate business functions on each floor, only top floor allowed full access.

  What is the role of data mining

Explain the difference between a project and operations. Provide examples and references.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd