Reference no: EM132889185
LD7010 Ethical Hacking for Cyber Security - Northumbria University
Ethical Hacking as a proactive and adversarial approach to secure systems
Learning Outcome 1: Assess computer systems, information systems and networks to identify their vulnerabilities and weaknesses.
Learning Outcome 2: Evaluate and understand the principles of ethical hacking and appreciate where and in what situations these principles should be applied
Learning Outcome 3: Critically evaluate the core concepts, knowledge and practice of computer security have developed through research
Learning Outcome 4: Appreciate the legal and ethical issues associated with ethical hacking and be able to apply them appropriately.
Requirements
For the practical part of this assignment, you will have to build three Virtual Machines (VM):
• A Linux Server
• You could use CentOS or Ubuntu Server
• Minimum configuration required
• DNS
• An additional service of your own choice (e.g. DHCP, FTP, SMTP, SNMP etc)
• A Client
• Could be either Windows (Visa, 7, 8, 10 etc) or Linux (Fedora, Ubuntu etc)
• You could create multiple copies of the client's VM if you require more clients to demonstrate an attack
• Attacker machine
• Kali Linux (the most recent version is highly recommended)
•
Assignment Tasks and Deliverables
The main submission is a single individual report consisting of two parts as follows:
Part A
In this first part of the assignment, you are required to:
• Provide a summary of the configuration steps on the server and client. Include screenshots to evident functionality at the client-side. Discuss the rationale behind service selection and configuration.
• Demonstrate a minimum of 2 attacks against each of the two services configured. Any further and complex attacks will attract more marks. Log all the important and offensive events against your target including attacks detected, services' logs nature, origin of the attack and damage caused. Support your demonstration with screenshots.
• Critically reflect on countermeasures and prevention mechanisms applied to mitigate against your attacks.
Part B
In the second part of the report, you are required to write a short position paper to critically analyse and reflect on recent state-of-the-art attacks and hacking techniques, followed by a discussion on possible countermeasures. (weights 40%)
Your paper should consider the following guidance and contain the following subtitles as a minimum:
• Title page and Abstract
• Introduction
• The nature of the brief/commission and the topic should be briefly outlined and defined alongside details of how the paper is organised.
• Scope: how did you select the attacks/techniques in this paper? E.g. most recent attacks, wireless attacks, VoIP attacks, DNS attacks etc
• Main body
• Critical discussion, reflection and analysis
• Conclusions
• A brief summary of the key findings established from your research.
• References.
• A full list of references used within the paper should be provided. The Harvard Style of referencing should be applied throughout the assignment.
Note: Need part A
Attachment:- Ethical Hacking for Cyber Security.rar