PG/UG CSI3208 / CSI5208 – Ethical Hacking and Defence

    Need Solution - Download from here



    Assignment 2

    Assessment Notes:       

    • UG (CSI3208) & PG (CSI5208) have different assessments
    • UG students must undertake the UG assignment
    • PG students must undertake the PG assignment
    • Kali Linux is available as a virtual machine on the Unit Resources section of Blackboard

     

    Task

    You are to infiltrate the provided system and attain root level privileges. Additionally there are five flags, these flags are represented as values and are awarded at each point of system compromise. Look for them in home directories, web pages etc.

     

    You are to write a report outlining each test / attack run against the system and the result. You must follow a process, which should be defined prior to the commencement of testing. Your report should include the flags as well as any credentials you uncover as part of your hacking endeavours.

     

    Note: You must compromise the system over the network, local, physical or other attacks requiring direct interaction with the target system are not valid for the purposes of the assignment.

     

    Example flag: chahNaelia9zohlaseiPaich0QuoWoh8ohfaenaiQuaetaebushoakarai6lainohjongoneesoocahdei6guosiethae7uwuu5Kaid9eisah8EChoo4kaiGh2eit2mu

     

     

    Postgraduate students: You must also write the following software and include it as part of your submission:

    • Basic TCP port scanner
    • Password cracker (of the type required to complete the case study)

     

    Submission Requirements

    You must include the following in your submission:

    • Your report containing:
      • Cover Page
      • Table of Contents
      • Executive Summary
      • Defined Methodology
      • Testing Log (should allow repeatability)
      • Results & Recommendations
    • Postgraduate Students:
      • Your source code for tools used
      • Compilation and usage instructions 

    Marking Guides

     

     

    CSI3208 (Undergrad)
    Item Mark
    Executive Summary 5
    Defined Methodology 15
    Testing Log 5
    Results & Recommendations 15
    Total: 40

     

     

    CSI5208 (Postgrad)
    Item Mark
    Executive Summary 5
    Defined Methodology 10
    Testing Log 5
    Results & Recommendations 15
    Source/Instructions: PortScanner 2
    Source/Instructions: Password Cracker 3
    Total: 40

     

    By |2017-10-06T09:07:58+00:00October 6th, 2017|Categories: computer science, linux|Tags: |0 Comments

    Leave A Comment