Category | Assignment | Subject | Computer Science |
---|---|---|---|
University | Murdoch University (MU) | Module Title | ICT387 Ethical Hacking and Software Security |
Assessment Title | Report |
---|
The purpose of the project is to demonstrate your practical skills in ethical hacking. This includes planning a pen test for a provided target, discovery/enumeration of the target, attacking the target, writing a pen test report and presenting the results.
The target in form of a VM for the pen testing will be provided to you by the unit coordinator by the start of week 2 of the semester.
For this project you must do a black box pen test, i.e. a test with almost no information about the target.
The project has two phases:
The company Flower Art, a flower shop, has decided to expand towards online business. Flower Art engaged the IT contractor Bodgie IT to build them a web server to handle Flower Art's online business. During the development there were several problems and Flower Art's general manager decided to hire an external consultant, you, to test the security of developed system.
A 1:1 clone of the system has been setup for your testing with the IP address 123.45.67.11. Note that rather setting up the system on the Internet, for the purposes of this assignment the machine will be provided to you as VM. This is for convenience only and you should assume that the machine runs at a different location and is only remotely accessible. Any access to the machine must be over the network. You are not allowed to directly log in to the VM or locally access the files of the VM.
You have unrestricted remote access to the system and can use any testing techniques and tools you like. Since the machine is hosted in a busy network you are requested to only use tools that cause significant traffic load outside the normal business hours of 9am to 5pm.
Since you are not working with a production system, personal identifiable information should not be an issue and there also no risk of a DoS attack due to destructive tests. However, on the other hand you want to make sure that your customer does not have to setup the target again and again.
This is a black box test and no further information about the machine will be available to you.
Any findings should be reported to Rick Rose and the management team of Flower Art.
The test should encompass discovery and identification of potential vulnerabilities in any network services running, in particular the web app, and the operating system itself. Full pen testing must be conducted to confirm vulnerabilities and demonstrate that they can be exploited. The results must be delivered to the client in form of a pen testing report and a short presentation that summarises the key results.
Do You Need Assignment of ICT387 Project Report
Order Non Plagiarized AssignmentThe pen testing report is the main deliverable through which the results are communicated to the client. In addition, key findings must be presented and demonstrated to the client.
This involves:
During the testing notes must be taken on steps carried out and results must be collected to be used for writing the pen testing report. As report writing is discussed in the lecture, we will not go into the details here, but the report must contain at least the following:
In the final presentation you will present your key result in a live presentation/demonstration either face-to-face (on-campus students) or via video conferencing tool (off-campus students). Screen capture videos are permissible only in exceptional circumstances and only if approved by the unit coordinator.
You will:
Buy Answer of ICT387 Project Report & Raise Your Grades
Order Non Plagiarized AssignmentIf you are worried about the ICT387 Ethical Hacking and Software Security Project Report? o need to worry anymore! Our experts are provide computer science assignment help that have designed for the students. You will get expert guidance and help on assignments that will strengthen your concepts. We also provide you with free assignment samples that will help you understand. And the best part? All the content is 100% original, written by PhD expert writers, and well-researched, so that you get the best quality. So don’t delay now; boost your grades with our help!
See the solution related of Computer Science click here: Computer Science Assignment Example
Let's Book Your Work with Our Expert and Get High-Quality Content