Get Instant Help From 5000+ Experts For

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
Learning Outcomes

Knowledge and Understanding

Knowledge and Understanding Successful students will typically …

  • understand some of the main features of prevalent operating systems;
  • have a knowledge and understanding of how and why different networking functions are separated in the layers of a protocol stack;
  • have a knowledge and understanding of different security threats to networks and how they might be encountered.

Skills  and  Attributes Successful students will typically …

be able to write simple scripts to solve problems relevant to different aspects of operating systems and computer networks.

In this coursework, you will study and investigate one of the wireless network security threats using relevant mechanisms and tools. This should include literature review, practical experiments, setting up and configuring necessary tools such as Dagah to develop your security scenario. With Dagah, you can design attacks against targets, launch them, and review the security threats and testing results. Smartphone attacks can be simulated using various exploitations such as phishing, harvesting, iOS profile, and malicious application exploitation

You will only need to select one topic from the list below as follows:

  • SMS attack
  • NFC attack
  • QR Code attack
  • Messaging Apps attack
  • Basic phishing
  • Harvester phishing
  • Android Agent post exploitation
  • iOS Agent post exploitation

You will use the penetration testing lifecycle to gather information through several means and sources for footprinting. This is to allow an ethical hacker to identify the target smartphone such as Android or iPhone App, give him/her a better understanding of the target’s mobile device and application services, plan its remote attack and create malicious app. To scan the wireless target systems for vulnerabilities identification and analysis you may use Airmon, Wireshark etc.

sales chat
sales chat