Research security vulnerability tools using kali

Assignment Help Other Subject
Reference no: EM131658256

Presentation: Research Security vulnerability tools using Kali (Linux)

As a group, present for approximately 30 minutes on one of the following topics. Groups need to self-organise in earlier weeks, and choose a topic in-class. Tutors will ensure that no two groups have the same topic.This task requires you to create a Kali hacking tools presentation by researching, experimenting with and explaining hacking toolsfeatures. After completing this task you should be able to use built in tools in Linux Kali to do vulnerability testing for the systems.

You should select one tool from the following list (if you want to select any other tool from Kali, please discuss with tutor):
- Hydra
- Maltego
- NMap
- Zed Attack Proxy
- SqlMap
- Metasploit Framework
- Burp Suite

Selected topic - Maltego

You are required to investigate your selected tool and explain the syntax of the commands you use. Your presentation must include at least 6 screenshots that demonstrate different features of the tool.

Your presentation should be sufficiently detailed to enableaudiences to be able to use the tool.
You can prepare the presentation on the selected tool containing following headings;

1. Introduction of the tool
2. Features of the tool
3. Techniques used by the tool to exploit vulnerabilities of information systems
4. Experimental setup and evidence of usage of the tool. Include screenshots of vulnerability testing.
5. Conclusions
6. References

Presentations will be 5 minutes, multiplied by the number of people in your group. If there are more groups than topics, then topics can be done by more than one group, at the tutor's discretion.
Groups must contain either 4 or 5 students as default - if a small group is formed (such as having two students remaining), then the tutor will rebalance the groups to ensure that there are no "small" groups. Only in exceptional cases will groups of a different size be allowed.

See the scoring sheet for this assignment, which is on the next page, and ensure that your presentation fulfils the criteria listed. All students in the same group get the same mark for "Content", while "Presentation" marks are assigned individually. Your final mark is the sum of the two.

Verified Expert

In this assignment, Maltego tool is selected. This task includes introduction and features of the tool. Techniques used by the tool to exploit vulnerabilities of information systems are also discussed in this assignment. Finally, experimental setup and evidence of usage of the too with screenshots of vulnerability testing are included in this assignment.

Reference no: EM131658256

Questions Cloud

How biofilm formation impact treatment of infectious disease : What do you think are the most important changes in chemotherapeutic management of microbial disease
Identify the main message or purpose : Identify the main message or purpose, Discuss how evidence-based practice (EBP) can be used in the student's current position or organization to improve
Should the judge grant the motion : In answer to another question, she said, "I think I bring a lot of background to this case, and I can't say that it's not going to cloud my judgment.
Explain the benefit of using a cds in the clinical situation : Explains the benefits and the challenges of using a CDS in the clinical situation you choose. Use your readings to support your rationale.
Research security vulnerability tools using kali : Research Security vulnerability tools using Kali - You are required to investigate your selected tool and explain the syntax of the commands you use
Should the court grant auto stiegler motion : The defendant filed a motion with the court to compel arbitration. Little responded that the arbitration agreement should not be enforced.
Discuss your own role in these three areas : Discuss your own role in these three areas, and the roles of your chief nurse executive, nurse manager
What is the target of teixobactin antibiotic activity : Based on the same journal, what is the target of teixobactin antibiotic activity and how was this determined (assay)
Define achieve level of evaluation and management : straightforward, low complexity, moderate complexity, and high complexity. State what is needed to achieve level of Evaluation and Management

Reviews

len1658256

9/26/2017 2:18:30 AM

Hi this is the assignment related to the information security and in this i choose "Maltego"topic. In this assignment i have to show my own work related to the techniques used and real screen shots of Experimental setup and how they work. I need this assignment by 28th. Please let me can you do this by 28th. Thanks

len1658256

9/26/2017 2:17:51 AM

Subtotal: 70 Subtotal for content Presentation Presentation style 10 The presenter is confident, understandable and well-rehearsed. Students who read or do not understand the material will lose marks. Presentation and contents 10 How well has the topic been covered? Were significant aspects ignored? Were the descriptions accurate? Have all the stated requirements been fulfilled. For instance screenshots and justifications. Time 10 The presenter uses their time appropriately, neither going under time nor over time. Subtotal: 30 Subtotal for presentation Total: 100 Submission Procedure You (every group members) are required to submit your presentation. Your submission must be received before the due time/date as indicated in the course description.

len1658256

9/26/2017 2:17:43 AM

Marking Scoring Question Score Description Contents of Presentation 1 Introduction of the tool 10 Comprehensive introduction given 2 Features of the tool 15 Full list of features is given 3 Techniques used 15 Techniques used by the tool to exploit vulnerabilities of information systems 4 Experimental setup 15 Experimental setup and evidence of usage of the tool. Include screenshots of vulnerability testing 5 Conclusions 10 Conclusion indicate full understanding of the tools 6 References 5 List given

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd