Research security vulnerability tools using kali

Assignment Help Other Subject
Reference no: EM132142318

Group Presentation: Research Security vulnerability tools using Kali (Linux)

Topic - SQLMap

As a group, present for approximately 30 minutes on one of the following topics. Groups need to self-organise in earlier weeks, and choose a topic in-class. Tutors will ensure that no two groups have the same topic. This task requires you to create a Kali hacking tools presentation by researching, experimenting with and explaining hacking tools features. After completing this task you should be able to use built in tools in Linux Kali to do vulnerability testing for the systems.

You should select one tool from the following list (if you want to select any other tool from Kali, please discuss with tutor):

- Hydra
- Maltego
- NMap
- Zed Attack Proxy
- SqlMap
- Metasploit Framework
- Burp Suite

You are required to investigate your selected tool and explain the syntax of the commands you use. Your presentation must include at least 6 screenshots that demonstrate different features of the tool.

Your presentation should be sufficiently detailed to enable audiences to be able to use the tool.

You can prepare the presentation on the selected tool containing following headings;

1. Introduction of the tool
2. Features of the tool
3. Techniques used by the tool to exploit vulnerabilities of information systems
4. Experimental setup and evidence of usage of the tool. Include screenshots of vulnerability testing.
5. Conclusions
6. References

Presentations will be 5 minutes, multiplied by the number of people in your group. If there are more groups than topics, then topics can be done by more than one group, at the tutor's discretion.

Groups must contain either 4 or 5 students as default - if a small group is formed (such as having two students remaining), then the tutor will rebalance the groups to ensure that there are no "small" groups. Only in exceptional cases will groups of a different size be allowed.
See the scoring sheet for this assignment, which is on the next page, and ensure that your presentation fulfils the criteria listed. All students in the same group get the same mark for "Content", while "Presentation" marks are assigned individually. Your final mark is the sum of the two.

Verified Expert

The solution file is prepared in ms power point which discussed about the sqlmap Introduction , Features of the SqlMap, Techniques used by the tool to exploit vulnerabilities of information systems , Experimental setup and evidence of usage of the tool which Included screenshots of vulnerability testing and finally conclude the report on SQLMap and references are included as per APA format

Reference no: EM132142318

Questions Cloud

How many bytes does the record take if : Suppose a record has the following fields in this order: A character string of length 15, an integer of 2 bytes, a SQL date, and a SQL time (no decimal point).
What is the appropriate statistical analysis : For each scenario below, what is the appropriate statistical analysis to use? (t-test for two independent samples, t-test for dependent samples
Find the standard deviation : For a sample n=36 nurses with 15 years or more experience find the standard deviation.
What is the appropriate hypothesis test to do the analysis : a. What is the appropriate hypothesis test to do the analysis? b. What is the null hypothesis and the alternative hypothesis?
Research security vulnerability tools using kali : MITS 5004 IT SECURITY - Create a Kali hacking tools presentation by researching, experimenting with and explaining hacking tools features
How many male students must you measure : You want to estimate the mean height of students at your college or university to within 0.6 inch with 93% confidence. How many male students must you measure?
Probability of picking either a pair of white socks : If each time you pick a sock from the drawer a sock just like it magically replaces it, what is the probability of picking either a pair of white socks or a pai
Difference equation and initial condition : Consider the following difference equation and initial condition(s). In each case, verify that the expression given for an (i) is a solution of the equation
How to calculate the sample space : Consider the experiment of drawing two cards from a deck in which all picture cards have been removed and adding their values (with ace = 1)

Reviews

urv2142318

11/20/2018 8:17:20 PM

As mention in guideline, it is an 30 Min presentation in group(4 Members) and In PPT we have sufficient number of screenshots. moreover there are command line screenshot available in PPT in usage of tool. It seems expert has gone thoroughly through the assignment. Perfect work. Very quick, and most important within 15hrs. Covered everything what was asked. All the requirements are followed, Thanks for accurate solution. I appreciate the efforts of the expert. thanks

len2142318

10/16/2018 4:29:02 AM

Submission Procedure You (every group members) are required to submit your presentation. Your submission must be received before the due time/date as indicated in the course description.

len2142318

10/16/2018 4:28:54 AM

Presentation Presentation style 10 The presenter is confident, understandable and well- rehearsed. Students who read or do not understand the material will lose marks. Presentation and contents 10 How well has the topic been covered? Were significant aspects ignored? Were the descriptions accurate? Have all the stated requirements been fulfilled. For instance screenshots and justifications. Time 10 The presenter uses their time appropriately, neither going under time nor over time. Subtotal: 30 Subtotal for presentation Total: 100

len2142318

10/16/2018 4:28:49 AM

Scoring Question Score Description Contents of Presentation 1 Introduction of the tool 10 Comprehensive introduction given 2 Features of the tool 15 Full list of features is given 3 Techniques used 15 Techniques used by the tool to exploit vulnerabilities of information systems 4 Experimental setup 15 Experimental setup and evidence of usage of the tool. Include screenshots of vulnerability testing 5 Conclusions 10 Conclusion indicate full understanding of the tools 6 References 5 List given Subtotal: 70 Subtotal for content

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd