This part of the practice involves the writing up and processing of results obtained in Laboratory Sessions done in the course.
Create your security case study by choosing a specific domain/s to do your penetration testing and risk assessments and countermeasures.
Make sure to take permission before starting the assignment.
Passive security artefacts, accepted, in the case of facing any difficulties obtaining the permissions.
Section A)
1) Explain in detail the difference between active reconnaissance and passive reconnaissance? Select a specific domain and perform the web search, google hacking, nslookup, Traceroute, Ping, Whois, Discover, Dig, FIERCE and maltego.
Critically analyse the result and draw a clear picture of the targets (to secure/hack)
Provide evidence of the reconnaissance work by providing screenshots /scripts.
Section B)
1) Scanning is a set of procedures for identifying live hosts, ports, and services, discovering the Operating system and architecture of the target system, Identifying vulnerabilities and threats in the network. Network scanning is used to create a profile of the target organisation.
Scanning refers to collecting more information using sophisticated and aggressive reconnaissance techniques
A. Use nmap, zenmap, netscan, masscan. Scapy and hping3 tools from Kali Linux to scan Metasploit Virtual machine,
B. Critically analyse the results show the open ports the services running on different ports and highlight on the advance features in nmap.
C. Perform another sweep scanning on a specific network using the zenmap. Draw The network Topology.
D. Support your report and analysis with screenshots, explain the policy and procedures the organisation should implement to reduce the impact of internal and external scanning.
2) Install and configure Nessus scanner on any platform to complete the vulnerability scanning on a single computer and then do it for the network.
Critically analyse the result, by selecting three vulnerabilities, try to find suitable countermeasures to protect the system.
Create a security document related to a different vulnerability discovered in your network, highlight your plan for mitigations, including cost/benefit analysis.
Section C)
1-
Evaluate UFW, set the rules to drop ICMP, SMTP and FTP.
2- Critically differentiate between IDS and IPS.
Use Snort as IDS to detect ICMP, nmap , hping3, create your own rules to alert about any tcp connection from any external source to our ssh port.
Support your work with codes and screenshots.
Section D)
1- Critically compare between the MSF and Armitage? Support your answer with examples.
2- Give an example of using MSF to exploit a vulnerability in a remote system support your case with screenshots, try to show your ability in solving different technical issues.
Module Learning Outcomes
1-
|
Test the effectiveness of security policies and procedures.
|
Yes
|
2-
|
Discuss knowledge of security concepts, data security, techniques and tools.
|
Yes
|
3-
|
Investigate and describe contemporary security issues.
|
Yes
|
4-
|
Produce security policy documentation based on best practice and to a professional standard
|
Yes
|
|
|
|
Breakdown of marks
a) 15%
b) 35%
c) 25%
d) 25%
The wight of this work =100% of the total marks assigned to this module.
Learning Resources
Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014. Digital crime and digital terrorism. Prentice Hall Press.
Casey, E., 2011. Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press.
Kanellis, P. ed., 2006. Digital crime and forensic science in cyberspace. IGI Global.
Stallings, W., Brown, L., Bauer, M.D. and Bhattacharjee, A.K., 2012. Computer security: principles and practice (pp. 978-0). Upper Saddle River (NJ: Pearson Education.
Marty, R., 2009. Applied security visualisation (p. 552). Upper Saddle River: Addison-Wesley.
Maurushat, A., 2019. Ethical Hacking.
Nguyen, T.N., 2019, January. Certified ethical hacker v. 10 online course: a case study. In Proceedings of the 10th International Conference on E-Education, E-Business, E-Management and E-Learning (pp. 168-173). ACM
|