• UG (CSI3208) & PG (CSI5208) have different assessments
• UG students must undertake the UG assignment
• PG students must undertake the PG assignment
• Kali Linux is available as a virtual machine on the Unit Resources section of Blackboard
You are to infiltrate the provided system and attain root level privileges. Additionally there are five flags, these flags are represented as values and are awarded at each point of system compromise. Look for them in home directories, web pages etc.
You are to write a report outlining each test / attack run against the system and the result. You must follow a process, which should be defined prior to the commencement of testing. Your report should include the flags as well as any credentials you uncover as part of your hacking endeavours.
You must compromise the system over the network, local, physical or other attacks requiring direct interaction with the target system are not valid for the purposes of the assignment.
chahNaelia9zohlaseiPaich0QuoWoh8ohfaenaiQuaetaebushoakarai6lainohjongoneesoocahdei6guosiethae7uwuu5Kaid9eisah8EChoo4kaiGh2eit2mu
You must also write the following software and include it as part of your submission:
• Basic TCP port scanner
• Password cracker (of the type required to complete the case study)
You must include the following in your submission:
• Your report containing:-
o Cover Page
o Table of Contents
o Executive Summary
o Defined Methodology
o Testing Log (should allow repeatability)
o Results & Recommendations
• Postgraduate Students:-
o Your source code for tools used
o Compilation and usage instructions
CSI3208 (Undergrad) | |
Item | Mark |
Executive Summary | 5 |
Defined Methodology | 15 |
Testing Log | 5 |
Results & Recommendations | 15 |
Total: | 40 |
CSI5208 (Postgrad) | |
Item | Mark |
Executive Summary | 5 |
Defined Methodology | 10 |
Testing Log | 5 |
Results & Recommendations | 15 |
Source/Instructions: PortScanner | 2 |
Source/Instructions: Password Cracker | 3 |
Total: | 40 |
Your work must comply with ECU referencing guidelines and plagiarism policy
CSI5208 Ethical Hacking Assignment Help, Online Ethical Hacking Assignment Help, Ethical Hacking Assignment Help, best coursework writing service, marketing assignment help online, assignment writing help services, professional assignment writing service, best website for assignment writing, psychology assignment writing service, best term paper writing service, best assignment help service
Holding a PhD degree in Finance, Dr. John Adams is experienced in assisting students who are in dire need...
55 - Completed Orders
Canada, Toronto I have acquired my degree from Campion College at the University of Regina Occuption/Desi...
52 - Completed Orders
Even since I was a student in Italy I had a passion for languages, in fact I love teaching Italian, and I...
102 - Completed Orders
To work with an organization where I can optimally utilize my knowledge and skills for meeting challenges...
109 - Completed Orders
JOB OBJECTIVE Seeking entry level assignments in Marketing & Business Development with an organization...
202 - Completed Orders
Current work profile Project manager- The Researchers Hub (2nd Jan 2016 to presently working) Researc...
20 - Completed Orders
Sales Assistant, Mito Marina Assigned to the Stationery dept – assisted in merchandising, stock taking...
100 - Completed Orders
Personal Profile Dedicated and highly experienced private chauffeur. High energy, hardworking, punctua...
200 - Completed Orders