Explain the syntax of the commands you use

Assignment Help Management Information Sys
Reference no: EM131997234

Group Presentation: Research Security vulnerability tools using Kali (Linux)

As a group, present for approximately 30 minutes on one of the following topics. Groups need to self-organise in earlier weeks, and choose a topic in-class.

Tutors will ensure that no two groups have the same topic.This task requires you to create a Kali hacking tools presentation by researching, experimenting with and explaining hacking toolsfeatures.

After completing this task you should be able to use built in tools in Linux Kali to do vulnerability testing for the systems.

You should select one tool from the following list(Select only one tool for assignment which ever is easier for you):

• Hydra

• Maltego

• Zed Attack Proxy

• Burp Suite

You are required to investigate your selected tool and explain the syntax of the commands you use. Your presentation must include at least 6 screenshots that demonstrate different features of the tool.

Your presentation should be sufficientlydetailed to enableaudiences to be able to use the tool.

You can prepare the presentation on the selected tool containing following headings;

1. Introduction of the tool

2. Features of the tool

3. Techniques used by the tool to exploit vulnerabilities of information systems

4. Experimental setup and evidence of usage of the tool. Include screenshots of vulnerability testing.

5. Shortcomings of the tool and possible improvements

6. Conclusions

. References

Presentations will be 5 minutes, multiplied by the number of people in your group. If there are more groups than topics, then topics can be done by more than one group, at the tutor's discretion.

Reference no: EM131997234

Questions Cloud

Universal declaration of human rights : What would happen if the government does not provide social and economic supports? How does this relate to the Universal Declaration of Human Rights?
Globally and make some comparisons : Can anyone share descriptions from other countries which have welfare systems that you would classify as more expansive and universal in nature?
How much income must usco include in its gross income : MexCo receives $7,000,000 from the sales in Mexico and $300,000 from the sales in Guatemala. How much income must USCo include in its gross income
Influence the structure of the government : How did that view influence the structure of the government? How were the weaknesses of human nature exploited to safeguard against abuses of government power?
Explain the syntax of the commands you use : As a group, present for approximately 30 minutes on one of the following topics. Groups need to self-organise in earlier weeks, and choose a topic in-class.
Interpret the destruction of cultural artifacts : Interpret the destruction of cultural artifacts through the lens of barbarity as laid out by Todorov.
Create a sensitivity graph comparing different alternatives : MedStar Health is expanding into Virginia. The firm must select one location where it can build a clinic to serve patients. The following table lists.
Why would someone want to limit campaign contributions : Why would someone want to limit campaign contributions? What effect do campaign contributions have on elected representatives?
Compute the monthly margin of safety : Foster's Repair Shop has a monthly target operating income of $10,500. Compute the monthly margin of safety in dollars if the shop achieves its income goal

Reviews

Write a Review

Management Information Sys Questions & Answers

  Evaluate a range of social media metrics

ITECH 7408 Social Media Strategy & Management. Purpose - The purpose of this task is for students to work in a team to investigate and evaluate a range of social media metrics and analytic approaches informing recommendations towards an organisati..

  How to market the business according to the four ps

how to market the business according to the four Ps. What strategies can you share with your friend to assist in launching the business?

  Software information assurancedeliverable length 6-8

software information assurancedeliverable length 6-8 paragraphsdetails congratulations you are one of the worlds finest

  Discuss the three levels of management hierarchy

Discuss how the three levels of management hierarchy: strategic, management, and operational relates to the mission of a business.

  What are the basic components of an rfp

What are the basic components of an RFP? What are the basic steps and components needed to evaluate submitted proposals?

  Analyze the leadership teams reaction to the failure

Analyze the leadership team's reaction to the failure, and indicate whether the leadership took sufficient measures to deal with various stakeholder groups impacted by the failure. Provide support for the rationale.Take a position on whether the ..

  Have you yourself done some systems analysis

Have you yourself done some systems analysis or business analysis activities? If so, what job title or other role did you have while doing such work? Tell us about your experience. Got one good story of something that went great,. . . or didn't?

  Explain the basic make-up for a computer

Computer and Functions - List and explain the basic make-up for a computer and the function each performs. Identify and describe the two types of software.

  Create an introductory section where you clearly define risk

Create an introductory section where you clearly DEFINE RISK. Research and Pick ONE organization that can you conduct a risk assessment on.

  Name four authentication policies

Name four authentication policies that can be enforced using technology and four authentication policies that cannot be enforced using technology

  Define inference and assumption

Define inference and assumption, and then explain the relationship between the two. Provide two examples of inferences that you made from assumptions that you have. Describe two intellectual standards, and give examples of each from your own life.

  Discuss about the implementation roadmap

Engaged your-selves in an active research and investigation perform the following tasks by using appropriate ICT Tools, into an executive style report.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd