Implementation and Evaluation of Penetration Testing Tools

Assignment Help Computer Networking
Reference no: EM132490138

MN623 Cyber Security and Analytics Assignment - Melbourne Institute of Technology, Australia

Assessment Title - Implementation and Evaluation of Penetration Testing Tools

Purpose - This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

a. Implement and evaluate security testing tools in a realistic computing environment.

Purpose of the Assignment: The A ssignment1 focuses on implementing and evaluating security testing tools in a realistic computing environment. It helps the students to learn how to perform hacking/penetration testing. The students will demonstrate how a target system works, the weaknesses in the system, how to exploit those weaknesses and hack the system, and how to secure the system from the discussed weaknesses.

By doing this assignment, students will learn to evaluate and applies contemporary intelligent cyber security solutions for enterprise use which will definitely act as a stimulus for work integrating learning. By the end of the assignment, the students will have a strong base and a good understanding of hacking/penetrati on testing, so they can be able to combine the techniques learnt and tailor them to suit different scenarios. This assignment will be a stepping stone for the students to be work force ready for the booming cyber security industry.

Assignment Structure and submission guidelines: Assignment 1 being formative assessment is divided into two parts. In t he first part -Assignment 1a, focuses on hashes and passwords and implementation and evaluation of the major password attack tools available in Kali Linux that is marked for 5% of the total marks a nd the second part is an extension of first part along with understanding and implementation of Network Reconnaissance, Exploitation and Reverse Engineering security tools covering the remaining 10 % of the total marks. In the second part- Assignment 1b, the students are required to e xplore and evaluate 3 security scanners but not limited to scanners like N-Stalker, Searchsploit and Metasploit tools.

Assignment 1 Specifications -

For this Assignment 1, you will implement and evaluate 2 password cracking tools in Kali Linux and explore and evaluate 3 security scanners.

You have to write a report for Assignment 1a and for Assignment 1b, a report with video presentation on how you will perfor m and evaluate these penetration testing tools is required.

Assignment 1a: Implement and evaluate 2 password cracking tools in Kali Linux

Focus on the following points while making a report:

Demonstrate building a Software Test platform to evaluate 2 password cracking tools.

Why attack and Penetration Tools are important?

What are the attributes of Good Assessment Tool for Penetration Testing?

Assignment 1b: Explore and evaluate 3 Exploitation and Reverse Engineering security scanners

Focus on the following points while making a video presentation and report:

Addressing the feedback provided in Part 1 of the assignment.

Demonstrate understanding and implementation of Network Reconnaissance, Exploitation and Reverse Engineering security tools.

There are several security scanners available in the market. Justify why you choose to explore the 3 Exploitation and Reverse Engineering security scanners you will be evaluating?

The students will demonstrate how a target system works, the weaknesses in the system, how to exploit those weaknesses and hack the system, and how to secure the system from the discussed weaknesses.

You should demonstrate 3 security scanners in the video and draw a conclusion on your experience with the 3 security scanners you evaluated.

Note - Assignment 1a - 600 words and Assignment 1b-800 words.

Attachment:- Penetration Testing Tools Assignment File.rar

Reference no: EM132490138

Questions Cloud

How many performance obligations does best buy : The one-year subscription and TV can also be purchased separately. How many performance obligations does Best Buy have related to Laura's purchase?
Analyze what makes someone a professional in your field : Describe and analyze what makes someone a professional in your field and Explain the behavioral attributes you practice that identify you as a professional
Determine what is the npv of the investment : Determine What is the NPV of the investment. Muncy, Inc., is looking to add a new machine at a cost of $4,133,250. The company expects this equipment
Differentiate profit and cash flow : Profitability and cash flow, Differentiate profit and cash flow. Provide an example and discuss a situation where profit and cash flow are at odds.
Implementation and Evaluation of Penetration Testing Tools : Assessment Title - Implementation and Evaluation of Penetration Testing Tools. Explore and evaluate 3 Exploitation and Reverse Engineering security scanners
How the performance of a company can affect a stakeholder : How the performance of a company can affect a stakeholder vs. a shareholder. Compare the position of a stakeholder and a shareholder regarding business
Overall process of glycosis exergonic or endergonic : Is the overall process of glycosis exergonic or endergonic, how do you know? Explain in detail (what does the net gain of 2 ATP have to do with it?)
How could company performance affect external stakeholder : In the addition, how could the company's performance affect the external stakeholder? how that stakeholder's relationship with a company could affect
Where are the cell bodies of these cells located : a. What is the name of the cells that secrete these thyroid hormones? b. What is the name of the cells that secrete calcitonin?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd