代做WM9PF-15 Ethical Hacking代做留学生SQL语言

Module title & code

WM9PF-15 Ethical Hacking

Assessment type

Coursework [MAIN]

Weighting of mark

80%

Assignment brief

At the end of this document

Word count

 

The word count is 3200 words.

+10% will be allowed on this word count without penalty. If you exceed this word count by more than 10% to 30%, a penalty of 10% on the original mark awarded will be applied. If you exceed this word count by more than 30%, the final mark will be capped at the pass mark.

The word count does not include tables, however, you must use tables carefully. Improper use of tables, e.g. as an opportunity to consume more words will be penalised.

The word count does not include references, or appendices. Although appendices are allowed, these will not be marked and only referred to add context, please do not place into the appendices anything which you materially rely upon in your submission.

 

Module learning outcomes (numbered)

1. Appraise the security posture of a network and connected systems by analysing the network configuration using appropriate tools where necessary.

2. Critically evaluate the configuration of network and endpoint security controls to achieve a desired security posture recommending adjustments where appropriate.

3. Demonstrate a comprehensive understanding of vulnerability exploitation techniques. Assess the results of system security tests in compliance with the relevant legal and regulatory frameworks, and recommend appropriate mitigation strategies.

 

Learning outcomes assessed in this assessment (numbered)

1, 2, 3, 4

 

Marking guidelines

Grade: 80+

Criteria: An exemplary penetration testing report, showing complete mastery of vulnerability assessment, exploitation, and post-exploitation techniques. The report exceeds all requirements, is free from errors, and demonstrates originality and strong critical reflection. The executive summary is exceptionally well-written and structured.

Requirements:

  - Thorough vulnerability assessment for each machine.

  - At least 4 vulnerabilities exploited per machine.

  - Comprehensive post-exploitation & analysis.

  - Exceptionally well-written executive summary

Grade: 70-79

Criteria: An excellent penetration testing report, showing mastery of vulnerability assessment, exploitation, and post-exploitation techniques. The report covers all requirements with very minor errors. The executive summary is very well-written and structured.

Requirements:

  - Thorough vulnerability assessment for each machine.

  - At least 4 vulnerabilities exploited per machine.

  - Comprehensive post-exploitation & analysis.

  - Very well-written executive report.

Grade: 60-69

Criteria: A strong penetration testing report, showing a sound grasp of vulnerability assessment, exploitation, and post-exploitation techniques. The report covers all requirements but may have some minor errors. The executive summary is well-written and organized.

Requirements:

  - Thorough vulnerability assessment for each machine.

  - At least 4 vulnerabilities exploited per machine.

  - Comprehensive post-exploitation & analysis.

  - Well-written executive report.

Grade: 50-59

Criteria: A satisfactory penetration testing report, showing a grasp of vulnerability assessment, exploitation, and post-exploitation techniques, but with a mechanical approach and heavy reliance on standard methodologies. The report covers the requirements but lacks critical reflection. The executive summary is adequately written but may have some confusion and lack of organization.

Requirements:

  - Vulnerability assessment for each machine.

  - At least 4 vulnerabilities exploited per machine.

  - Post-exploitation analysis.

  - Adequately written executive report.

Grade: 40-49

Criteria: An unsatisfactory penetration testing report. The report shows a weak attempt at vulnerability assessment, exploitation, and post-exploitation techniques. Only some requirements are covered, and the executive summary is poorly written and organized.

Requirements:

  - Partial vulnerability assessment for each machine.

  - Less than 25% vulnerabilities exploited per machine.

  - Incomplete post-exploitation analysis.

  - Poorly written executive report.

Grade: < 40

Criteria: An inadequate penetration testing report with serious gaps in knowledge and many areas of confusion. Few or none of the requirements are covered, and the executive summary is very poorly written and organized.

Requirements:

  - Incomplete or missing vulnerability assessment.

  - Few than 20% or no vulnerabilities exploited.

  - Incomplete or missing post-exploitation analysis.

  - Very poorly written executive report.

Academic guidance resources

You will have an opportunity to ask questions and get support on the assessment after it has been handed to you. You will be supported in this assessment through:

· Through emails directed to the module tutor.

· Moodle FAQ

Notes to students:

If support is provided on a Teams Channel or a Moodle forum, please ensure you check previous questions posted on the channel. The Teams/Moodle channel will typically be closed one week before the submission date and no new questions will be addressed, please organise your time accordingly. Please be patient with module tutors. Please turn on your Teams Channel/Moodle notifications. If a tutor has not responded to a query within 5 working days, please email the module leader.

Where to get help:

1. Talk to your module tutor if you don’t understand the question or are unsure as to exactly what is required.

2. Study, Professional and Analytical Skills (SPA) Moodle site – we have a lot of resources on this website with workbooks, links and other helpful tools.  https://moodle.warwick.ac.uk/

3. There are also numerous online courses provided by the University library to help in academic referencing, writing, avoiding plagiarism and a number of other useful resources. https://warwick.ac.uk/services/library/students/your-library-online/

4. If you have a problem with your wellbeing, it is important that you contact your personal tutor or wellbeing support services https://warwick.ac.uk/services/wss

 

Assessment brief

Assignment Introduction for Penetration Testing of Infrastructure and Web Applications

1. Introduction

Regular penetration testing is essential to help identify and eliminate gaps in security defences. This assignment simulates a scenario for a company, NewBizz Ltd, that is new to penetration testing. The company does not have extensive experience in cybersecurity. The manager and senior manager are keen to understand how secure their system is. The management team intends to share this report with software developers, SOC analysts, and the IT manager. Only the senior management team is aware that the penetration testing is ongoing. As a penetration tester, you are authorized to perform. a full exploitation of the network.

1.1 1.1 Scope

Both infrastructure testing and web application testing are in scope for this assignment. The penetration test is to be performed out of office hours only, implying no interaction with end users, thus excluding social engineering from the scope. The penetration tester is allowed to perform. a full exploitation of services and download associated data to show the real impact of a potential attack.

1.2 1.2 Accessing the Network

The network provided to the participant consists of 5 virtual machines. These virtual machines can be accessed via the link provided in class. The penetration tester is required to set up a virtual machine network and add all 5 virtual machines, like the setup demonstrated in class.

Tasks to Perform. During the Technical Testing:

1. Conduct a Full Vulnerability Assessment:

o Perform. a comprehensive scan of the network and web applications to identify security vulnerabilities. Use appropriate tools to uncover weaknesses in network configurations, software, and web applications.

2. Analyze and Assess Risks:

o Evaluate the identified vulnerabilities to determine their potential impact on the confidentiality, integrity, and availability of the system. Categorize vulnerabilities based on their severity and likelihood of exploitation.

3. Exploit Identified Vulnerabilities:

o Demonstrate the exploitation of identified vulnerabilities to showcase the potential impact. This includes remote code execution, privilege escalation, and data exfiltration.

4. Conduct Post-Exploitation Analysis:

o After successful exploitation, assess the potential damage and impact of the attack. Document the steps taken during the exploitation phase and analyze the consequences on the system.

5. Provide Remediation Recommendations:

o Recommend appropriate mitigation strategies to address identified vulnerabilities. This includes specific actions such as patching, configuration changes, and implementing security best practices.

6. Document Findings and Evidence:

o Prepare a detailed report summarizing the findings, exploitation steps, and recommendations. Include evidence such as screenshots, logs, and command outputs to support your findings.

Special instructions

Do not include the Assignment Guidance and Front Sheet in the submission.

Spelling/grammar. Ensure that you spell check the submission, use a grammar checker and ensure that you proofread your work prior to submission. Spell/grammar checkers must be set to UK English, do not use ‘Americanised’ spellings.

References. References are to be included at the end of the report using the Harvard referencing system. You may also include a bibliography. Each reference must be connected to a citation within the main body of the report.

Do not attempt to hide text within JPEGs, this will be construed as an attempt to mislead the assessor.

Coherence. A poorly worded report will hide excellent content. The narrative should be easy to read, and arguments should be presented coherently and convincingly.

Presentation. At this stage in your studies, there is no excuse for poor presentation. You will not receive marks for presentation; however, your submission will be penalised for poor presentation.

Formatting. All figures and tables must be properly labelled and captioned. All pages must be numbered. Formatting must be consistently applied throughout the submission. Submissions that stray from this guidance may be penalised.

 



热门主题

课程名

mktg2509 csci 2600 38170 lng302 csse3010 phas3226 77938 arch1162 engn4536/engn6536 acx5903 comp151101 phl245 cse12 comp9312 stat3016/6016 phas0038 comp2140 6qqmb312 xjco3011 rest0005 ematm0051 5qqmn219 lubs5062m eee8155 cege0100 eap033 artd1109 mat246 etc3430 ecmm462 mis102 inft6800 ddes9903 comp6521 comp9517 comp3331/9331 comp4337 comp6008 comp9414 bu.231.790.81 man00150m csb352h math1041 eengm4100 isys1002 08 6057cem mktg3504 mthm036 mtrx1701 mth3241 eeee3086 cmp-7038b cmp-7000a ints4010 econ2151 infs5710 fins5516 fin3309 fins5510 gsoe9340 math2007 math2036 soee5010 mark3088 infs3605 elec9714 comp2271 ma214 comp2211 infs3604 600426 sit254 acct3091 bbt405 msin0116 com107/com113 mark5826 sit120 comp9021 eco2101 eeen40700 cs253 ece3114 ecmm447 chns3000 math377 itd102 comp9444 comp(2041|9044) econ0060 econ7230 mgt001371 ecs-323 cs6250 mgdi60012 mdia2012 comm221001 comm5000 ma1008 engl642 econ241 com333 math367 mis201 nbs-7041x meek16104 econ2003 comm1190 mbas902 comp-1027 dpst1091 comp7315 eppd1033 m06 ee3025 msci231 bb113/bbs1063 fc709 comp3425 comp9417 econ42915 cb9101 math1102e chme0017 fc307 mkt60104 5522usst litr1-uc6201.200 ee1102 cosc2803 math39512 omp9727 int2067/int5051 bsb151 mgt253 fc021 babs2202 mis2002s phya21 18-213 cege0012 mdia1002 math38032 mech5125 07 cisc102 mgx3110 cs240 11175 fin3020s eco3420 ictten622 comp9727 cpt111 de114102d mgm320h5s bafi1019 math21112 efim20036 mn-3503 fins5568 110.807 bcpm000028 info6030 bma0092 bcpm0054 math20212 ce335 cs365 cenv6141 ftec5580 math2010 ec3450 comm1170 ecmt1010 csci-ua.0480-003 econ12-200 ib3960 ectb60h3f cs247—assignment tk3163 ics3u ib3j80 comp20008 comp9334 eppd1063 acct2343 cct109 isys1055/3412 math350-real math2014 eec180 stat141b econ2101 msinm014/msing014/msing014b fit2004 comp643 bu1002 cm2030
联系我们
EMail: 99515681@qq.com
QQ: 99515681
留学生作业帮-留学生的知心伴侣!
工作时间:08:00-21:00
python代写
微信客服:codinghelp
站长地图