Reference no: EM132308907
Assignment - Research and Presentation on security vulnerability tools using Kali Linux
1. Group Formation
For this assignment, students need to form groups of 4 to 5 members under the supervision of Lecturer/Tutor. Each group must be formed of 4 to 5 students. In case there is a small group (such as with remaining two students), then the Lecturer/Tutor can rebalance the groups to ensure that there are no "small" groups.
2. Topic Selection
Each group needs to select one of the following security vulnerability testing tools of Kali Linux on a first come first served basis:
• Hydra
• Maltego
• NMap
• Zed Attack Proxy
• SqlMap
• Metasploit Framework
• Burp Suite
If there are more groups than the number of available topics, then one topic can be selected by more than one group. This should be arranged under the discretion of Lecturer/Tutor.
If a group wants to select a security vulnerability testing tool of Kali Linux that is not listed above, the group needs to discuss this with the Lecturer/Tutor.
Report
Each group needs to prepare a report (must be in PDF/DOC/DOCX) in the following format (section headings):
1. Introduction of the tool
2. Features of the tool
3. Techniques used by the tool to exploit vulnerabilities of information systems
4. Experimental setup and evidence of usage of the tool (include screenshots of vulnerability testing that you have performed)
5. Conclusions
6. References
The size of the report should be from 1500 to 1700 words. Report should include group number and member information (member students' name and students ID numbers).
Oral Presentation
Each person in a group needs to perform oral presentation of the selected tool for 5 minutes. The presentation should be sufficiently detailed to enable audiences to be able to use the tool. The oral presentation should (not limited to) include the following aspects:
• Introduction to Kali Linux
• Introduction to the selected tool of Kali Linux
• Features of the tool
• Details on the types of security vulnerability checks/attacks that can be carried out with the tool
Each student needs to prepare a powerpoint/PDF presentation of 10-12 slides and show it during the oral presentation. The powerpoint/PDF slides should contain 5-6 screenshots of the experiements performed by the student.