Reference no: EM131658256
Presentation: Research Security vulnerability tools using Kali (Linux)
As a group, present for approximately 30 minutes on one of the following topics. Groups need to self-organise in earlier weeks, and choose a topic in-class. Tutors will ensure that no two groups have the same topic.This task requires you to create a Kali hacking tools presentation by researching, experimenting with and explaining hacking toolsfeatures. After completing this task you should be able to use built in tools in Linux Kali to do vulnerability testing for the systems.
You should select one tool from the following list (if you want to select any other tool from Kali, please discuss with tutor):
- Hydra
- Maltego
- NMap
- Zed Attack Proxy
- SqlMap
- Metasploit Framework
- Burp Suite
Selected topic - Maltego
You are required to investigate your selected tool and explain the syntax of the commands you use. Your presentation must include at least 6 screenshots that demonstrate different features of the tool.
Your presentation should be sufficiently detailed to enableaudiences to be able to use the tool.
You can prepare the presentation on the selected tool containing following headings;
1. Introduction of the tool
2. Features of the tool
3. Techniques used by the tool to exploit vulnerabilities of information systems
4. Experimental setup and evidence of usage of the tool. Include screenshots of vulnerability testing.
5. Conclusions
6. References
Presentations will be 5 minutes, multiplied by the number of people in your group. If there are more groups than topics, then topics can be done by more than one group, at the tutor's discretion.
Groups must contain either 4 or 5 students as default - if a small group is formed (such as having two students remaining), then the tutor will rebalance the groups to ensure that there are no "small" groups. Only in exceptional cases will groups of a different size be allowed.
See the scoring sheet for this assignment, which is on the next page, and ensure that your presentation fulfils the criteria listed. All students in the same group get the same mark for "Content", while "Presentation" marks are assigned individually. Your final mark is the sum of the two.
How biofilm formation impact treatment of infectious disease
: What do you think are the most important changes in chemotherapeutic management of microbial disease
|
Identify the main message or purpose
: Identify the main message or purpose, Discuss how evidence-based practice (EBP) can be used in the student's current position or organization to improve
|
Should the judge grant the motion
: In answer to another question, she said, "I think I bring a lot of background to this case, and I can't say that it's not going to cloud my judgment.
|
Explain the benefit of using a cds in the clinical situation
: Explains the benefits and the challenges of using a CDS in the clinical situation you choose. Use your readings to support your rationale.
|
Research security vulnerability tools using kali
: Research Security vulnerability tools using Kali - You are required to investigate your selected tool and explain the syntax of the commands you use
|
Should the court grant auto stiegler motion
: The defendant filed a motion with the court to compel arbitration. Little responded that the arbitration agreement should not be enforced.
|
Discuss your own role in these three areas
: Discuss your own role in these three areas, and the roles of your chief nurse executive, nurse manager
|
What is the target of teixobactin antibiotic activity
: Based on the same journal, what is the target of teixobactin antibiotic activity and how was this determined (assay)
|
Define achieve level of evaluation and management
: straightforward, low complexity, moderate complexity, and high complexity. State what is needed to achieve level of Evaluation and Management
|