Presentation on security vulnerability tools

Assignment Help Computer Engineering
Reference no: EM132308907

Assignment - Research and Presentation on security vulnerability tools using Kali Linux

1. Group Formation

For this assignment, students need to form groups of 4 to 5 members under the supervision of Lecturer/Tutor. Each group must be formed of 4 to 5 students. In case there is a small group (such as with remaining two students), then the Lecturer/Tutor can rebalance the groups to ensure that there are no "small" groups.

2. Topic Selection
Each group needs to select one of the following security vulnerability testing tools of Kali Linux on a first come first served basis:
• Hydra
• Maltego
• NMap
• Zed Attack Proxy
• SqlMap
• Metasploit Framework
• Burp Suite

If there are more groups than the number of available topics, then one topic can be selected by more than one group. This should be arranged under the discretion of Lecturer/Tutor.

If a group wants to select a security vulnerability testing tool of Kali Linux that is not listed above, the group needs to discuss this with the Lecturer/Tutor.

Report

Each group needs to prepare a report (must be in PDF/DOC/DOCX) in the following format (section headings):

1. Introduction of the tool
2. Features of the tool
3. Techniques used by the tool to exploit vulnerabilities of information systems
4. Experimental setup and evidence of usage of the tool (include screenshots of vulnerability testing that you have performed)
5. Conclusions
6. References

The size of the report should be from 1500 to 1700 words. Report should include group number and member information (member students' name and students ID numbers).

Oral Presentation

Each person in a group needs to perform oral presentation of the selected tool for 5 minutes. The presentation should be sufficiently detailed to enable audiences to be able to use the tool. The oral presentation should (not limited to) include the following aspects:

• Introduction to Kali Linux
• Introduction to the selected tool of Kali Linux
• Features of the tool
• Details on the types of security vulnerability checks/attacks that can be carried out with the tool

Each student needs to prepare a powerpoint/PDF presentation of 10-12 slides and show it during the oral presentation. The powerpoint/PDF slides should contain 5-6 screenshots of the experiements performed by the student.

Verified Expert

This document contains how to check the vulnerability of a web application. The document contain steps to install the sqlmap and commands that are required to check the various vulnerabilities.The document also contains the screenshots of the live check of the different websites and shows whether they are vulnerable or not. The presentation is also made to explain the same.

Reference no: EM132308907

Questions Cloud

What are the positive implications of collecting sales tax : In June 2018, the U.S. Supreme Court ruled that states can force large online retailers to collect sales tax from customers, even if the retailer does not have.
What are the negative aspects of raising the minimum wage : What are the negative aspects of raising the minimum wage according to John Stossel and Guest? In your opinion, which side of the argument has more merit?
Estimate that this computational task belongs to class NP : Let's estimate that this computational task belongs to class NP. What is additional information, that in this case is required for check algorithm
Examine the practical implications of marketing matrix : VBE 1005-INTRODUCTION TO MARKETING,Victoria University Melbourne Australia: How the key elements of the marketing environment currently affect a business;
Presentation on security vulnerability tools : MITS 5004 IT SECURITY - Research and Presentation on security vulnerability tools using Kali Linux - Experimental setup and evidence of usage of the tool
Difference between comparative and absolute advantage : What is the difference between comparative and absolute advantage? Visit the following CIA Factbook website, select two countries of interest to you.
What were your main takeaways from the video : As a fellow with the Federal Reserve Bank I would like to include some of the educational information provided by the Federal Reserve Bank to increase awareness
How does your organization guard against a breach : Leveraging technology is a concept that is not going anywhere anytime soon. How does your organization guard against a breach of your personal information?
Developing prevention and education activities : Create a pamphlet or small booklet that helps promote optimal human development, wellness, and mental health through prevention and education activities.

Reviews

len2308907

5/20/2019 3:55:12 AM

Subtotal: 70 Subtotal for Report Oral Presentation Oral Presentation style 10 The presenter is confident, understandable, and well-rehearsed. Students who read from scripts or do not understand the material will lose marks. Presentation and contents 10 The following questions will be checked: -How well has the topic been covered? -Were significant aspects ignored? -Were the descriptions accurate? -Have all the stated requirements been fulfilled (for instance, screenshots and justifications)? Time 10 The presenter uses their time appropriately, neither going under time nor over time. Subtotal: 30 Subtotal for Oral Presentation Total: 100

len2308907

5/20/2019 3:55:04 AM

Feature Score Description Report Introduction of the tool 10 Comprehensive introduction Features of the tool 15 Full list of features Techniques used 15 Techniques used by the tool to exploit vulnerabilities of information systems Experimental setup 15 Experimental setup and evidence of usage of the tool. Include screenshots of vulnerability testing performed by the students Conclusions 10 Conclusion should indicate full understanding of the tools References 5 Appropriate reference list for the selected tool

len2308907

5/20/2019 3:54:56 AM

Students are required to submit the followings through Moodle: 1. Report (1500 to 1700 words): Must be in either PDF or DOC/DOCX format. 2. Video Presentation (5 mins presentation): Must be in mp4 or other similar format, and must be less than 100 MB size. 4. Assignment Scoring Breakdown See the scoring sheet below for this assignment and ensure that your presentation fulfills the scoring criteria listed. All students in the same group will get the same mark for Report submission, while Oral Presentation marks are assigned individually based on individual performance. Your final mark will be the sum of the two marks.

len2308907

5/20/2019 3:54:46 AM

Members of each group need to learn the usage of the selected tool of Kali Linux. For this students need to research, install, and use Kali Linux and the selected tool. After sufficient study and hands on experience, each group needs to prepare and submit a report, and orally present their understanding on the selected tool and Kali Linux as a whole (individual member presentation). Formats of report and oral presentation are mentioned below.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd