Research security vulnerability tools using kali

Assignment Help Programming Languages
Reference no: EM132900454

Tool - HYDRA

Presentation: Research Security vulnerability tools using Kali (Linux)

It is an individual assignment for online students and a group-based assignment for on- campus students. Online students need to prepare an audio/video presentation of 5 minutes and upload it to Moodle shell. The on-campus students need to present for approximately 30 minutes on one of the following topics. Groups need to self-organise in earlier weeks and choose a topic in-class (Online students need to inform the course coordinator via email). Tutors will ensure that no two groups have the same topic. This task requires you to create a Kali hacking tools presentation by researching, experimenting with, and explaining hacking tools features. After completing this task, you should be able to use built in tools in Linux Kali to do vulnerability testing for the systems.

You should select one tool from the following list (if you want to select any other tool from Kali, please discuss with tutor):
» Hydra
» Maltego
» NMap
» Zed Attack Proxy
» SqlMap
» Metasploit Framework
» Burp Suite

You are required to investigate your selected tool and explain the syntax of commands you use. Your presentation must include at least 6 screenshots that demonstrate different features of the tool. Your presentation should be sufficiently detailed to enable audiences to be able to use the tool. You can prepare the presentation on the selected tool containing following headings.
1. Introduction of the tool
2. Features of the tool
3. Techniques used by the tool to exploit vulnerabilities of information systems
4. Experimental setup and evidence of usage of the tool. Include screenshots of vulnerability testing.
5. Shortcomings of the tool and possible improvements
6. Conclusions
7. References

Presentations will be 5 minutes, multiplied by the number of people in your group. If there are more groups than topics, then topics can be done by more than one group, at the tutor's discretion.

Groups must contain either 4 or 5 students as default - if a small group is formed (e.g., having two students remaining), then the tutor will rebalance the groups to ensure that there are no "small" groups. Only in exceptional cases will groups of a different size be allowed.
See the scoring sheet for this assignment, which is on the next page, and ensure that your presentation fulfils the criteria listed. All students in the same group get the same mark for "Contents", while "Presentation" marks are assigned individually. Your final mark is the sum of the two.

Attachment:- vulnerability tools.rar

Reference no: EM132900454

Questions Cloud

What decisions-making do managers at different levels make : What decisions-making do managers at different levels make?
Enlightened your perspectives on leadership : Enlightened your perspectives on leadership or management?
Social mobility in developing and industrialized nations : Contrast social mobility in developing and industrialized nations. Do you think the differences will eventually disappear? Why or why not?
What is the total amount of her tax savings : If Maria-Victoria's marginal tax rate is 38% and she contributes $13,500 to her RRSP for the 2020 tax year, what is the total amount of her tax savings"?
Research security vulnerability tools using kali : Research Security vulnerability tools using Kali - explain the syntax of commands you use. Your presentation must include at least 6 screenshots
Implement a no-encirclement decision : 1. Do you anticipate StarKist to derive financial (economic) benefits from its decision to implement a no-encirclement decision? Why/why not?
Interview patient of ethnic minority : Interview a patient of an ethnic minority group to gain insight of how they feel about their overall healthcare.
Numerous medical organizations are keeping records online : Numerous medical organizations are keeping records online. Some are linking their hospital networks to the Internet.
Searching the internet for authoritative references : Start this discussion by searching the internet for authoritative references regarding formal instructional presentations. Discuss some or all of the following:

Reviews

Write a Review

Programming Languages Questions & Answers

  Write a paper discussing threads vs processes

Write a paper discussing Threads vs Processes. What is a Thread? What is a Process? How are they different? How are they the same? What types of problems lend themselves to Threads?

  Create shell script to enter length and width of rectangle

Network client needs you create the shell script which permits the user to enter length and width of rectangle. Perimeter of rectangle is then computed and printed to computer screen.

  Design pseudocode for application to enter order item

Design the pseudocode for an application that allows a user to enter an order item continuously until a sentinel value is entered.

  Write the given fucntions and test

Write the following fucntions and test then in the main without using library or pointer. using only namespace std, and include find_first_of, and find_first_not_of.

  Use a switch statement to calculate a letter grade

Use a switch statement to calculate a letter grade based on a numeric average up to 100. Allow the numeric score to be entered in a text field. A Grade button will display the corresponding letter grade in a label.

  Create two virtual machines each running

Create two Virtual machines each running a different but the latest distribution of Linux e.g. Ubuntu Server and/or CentOS Server. Each of these VM's

  Multi-level feedback queue simulation

Multi-Level Feedback Queue simulation - write a Java program that will simulate an operating system's job scheduling policy to determine which process

  Why do we have both debug and release builds

When two or more functions have the same name, how does the compiler determine which one to use for a particular function call?

  Formulate a nonlinear-programming model that will have

Formulate a nonlinear-programming model that will have an expected number T of enrolling needy admit tees, and minimize the scholarship budget.

  Web design and object-oriented programming

Identify two differences between web design and object-oriented programming

  What was the highest grade on test two

Write a method that takes in a teacher's last name and exam number via parameters. Ask the teacher (using her name) to tell you the highest score on that exam.

  Pseudocode of program that will prompt user for number

Write pseudocode and flowchart for a program which will prompt user for a number, prompt the user for an operator (+,-,*,/), prompt the user for another number.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd