Ethical Hacking

Element 1: For the practical part of this assignment, you will have to build Virtual Machines (VM), an exemplar scenario is clarified below but you can choose a different setup:

1. A Server

o You could use a Linux (e.g. CentOS, Ubuntu Server), or a Windows Server o Minimumconfigurationrequired

▪ Two services of your own choice (e.g. DHCP, FTP, SMTP, SNMP, Web etc)

2. A Client

o Could be either Windows (Visa, 7, 8, 10 etc) or Linux (Fedora, Ubuntu etc) o You could create multiple copies of the client’s VM if you require more

clients to demonstrate an attack 3. Attacker machine

o KaliLinux(themostrecentversionishighlyrecommended)

Element 2: For this element, you are required to reference peer-reviewed papers.

In this first part of the assignment, you are required to plan and demonstrate a case study of offensive security:

• •

Provide a summary of the configuration steps (e.g. for the server and client machines). Include screenshots to show that the environment is functional (e.g. to evident functionality at the client-side). Discuss the rationale behind service selection and configuration.

Demonstrate a minimum of 2 attacks in total against the services configured. Any further and complex attack steps will attract more marks. Log all the important and offensive events against your target including attacks detected, services’ logs nature, the origin of the attack and damage caused. Support your demonstration with screenshots.

Critically reflect on countermeasures and prevention mechanisms applied to mitigate against your attacks.

In the second part of the report, you are required to write a short position paper to critically analyse and reflect on recent state-of-the-art attacks and hacking techniques, followed by a discussion on possible countermeasures.

Your paper should consider the following guidance and contain the following subtitles as a minimum:

• Title page and Abstract

• Introduction

o The nature of the brief/commission and the topic should be briefly outlined and defined alongside details of how the paper is organised.

o Scope:howdidyouselecttheattacks/techniquesinthispaper?[login to view URL], wireless attacks, IoT attacks, DNS attacks etc

• Main body

o Critical discussion, reflection and analysis

• Conclusions

o A brief summary of the key findings established from your research.

• References.

o A full list of references used within the paper should be provided. The Harvard Style of

referencing should be applied throughout the assignment.

Word count for Element 1 is 2000 words (+/- 10%) excluding references. Make sure you write the wordcount of Element 1 in your submission.

• Word count for Element 2 is 1500 words (+/- 10%) excluding references. Make sure you write the wordcount of Element 2 in your submission.

Compétences : Certified Ethical Hacking, Linux, CentOs, Sécurité Web, Sécurité Informatique

En voir plus : virtual machines preinstalled, build virtual buildings, vmware server number virtual machines, free lance ethical hacking, java build virtual printer, ethical hacking siteee, program information security ethical hacking india, vmware virtual machines preinstaled, vmware network test lab virtual machines linux, freelance ethical hacking, build virtual bartender, build virtual piano java, virtual machines folder wmi, virtual machines setup, ethical hacking certified pune, vmware preinstalled virtual machines, build virtual custom guitar, hacking virtual machines

Concernant l'employeur :
( 8 commentaires ) luton, United Kingdom

Nº du projet : #30119406

Décerné à:


I am a Cyber and information security expert and I have passed CEH. I invest my time and skills to help people protect their business from Cybercriminals. My specialties are 10+-years of experience, Information Securit Plus

%selectedBids___i_sum_sub_7% %project_currencyDetails_sign_sub_8% USD en 7 jours
(5 Commentaires)

13 freelances font une offre moyenne de 199 $ pour ce travail

(170 Commentaires)
(60 Commentaires)

Hey there, I have been in the InfoSec for years. I had conducted tons of Ethical Hacking projects. I can help. Regards!

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 7 jours
(60 Commentaires)

Hey there I have made a virtual scenario where I exploit a Windows 2019 domain, for the purpose of escalating privileges and also to make use of vulnerabilities to take over DC. The machine used are Windows Servers, K Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 12 jours
(12 Commentaires)

Hello Mate! If the project is deleted please open my portfolio link and hire me  https://www.freelancer.com/u/saminakiran2?w=f&ngsw-bypass=ust Hire me through my profile and lets discuss your  project details .  I have Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 2 jours
(6 Commentaires)

Hi, I have more than 6 years of experience as DevOps with AWS, Azure, GCP, Digital Ocean and Open source Cloud technologies as well as with Linux & Windows system administration. Also I am Certified in AWS, RedHat, E Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 7 jours
(3 Commentaires)

Hi there ! My Team with 6 years of experience in security engineering do a lot of projects just like yours on many similar project . They gives Us just the right experience and perspective that your looking for. In 20 Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 7 jours
(1 Évaluation)

Glad to see your offer. I have gone through the shared description and it seems like you are looking for some pen-tester who can perform an assessment of the defined scope. I have been working with Big4 in the domain Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 7 jours
(2 Commentaires)

Hi. Let me introduce myself. I am an Information Security Expert with real world hands on experience, graduate level education, and active industry certifications. Currently I am employed in a private firm as a cyber Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 10 jours
(1 Évaluation)

Greetings of the day! Glad to see your offer. I have gone through the shared description and it seems like you are looking for some pen-tester who can perform an assessment of the defined scope. I have been workin Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 7 jours
(0 Commentaires)

Hello, Good Day. We have read the requirements of your project. Therefor We would like to let you know that we can fulfil your requirement properly as we have the experience of working in this sector for many years no Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 12 jours
(0 Commentaires)

My name is Kiranmayee. I completed my Master's in Information security with good practical knowledge about network security. I worked on a similar project in my Masters and created a report. I have working experience w Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 10 jours
(0 Commentaires)