Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Virtual Environment Creation and Ethical Hacking: A Guide

Task 1:

You need to create/develop a virtual environment using Virtual Box or VMWare. Use virtual machine images such as Kali to create a Metasploit system and create other virtual machine images as Metasploitable system.

Task 2:

Your developed system should be able to perform different ethical hacking methods to demonstrate how hackers generally carry out different steps in order to find vulnerabilities in companies’ network systems. Please use the following steps as guidelines:

  1. The easiest way for hackers to get into an organisation’s network is by scanning WiFi network and getting WiFi password. You are required to demonstrate the steps hackers perform in order to get the Wi-Fi password.
  2.  After being successful in finding Wi-Fi passwords, demonstrate the steps hacker can perform network scanning using any appropriate tools (such as Namp/Zenmap) and analyse their results. You are then required to perform at least two open port exploitations such as FTP, ssh, telnet etc.
  3. Perform a Man in the Middle attack to demonstrate how hackers can sniff, analyse, and steal sensitive data from HTTP packets.
  4. If your organisation’s systems are using HTTPS for internet communication, to what extend is it possible for hackers to penetrate the system and get sensitive data? Illustrate the process and provide solutions to counteract those threats.
  5.  Demonstrate how you can use Steganography to hide important and sensitive data from hackers.

Task 3:

Your Company’s managers are now worried about Covid-19-related fraud and scams within the organisation with the use of social engineering tools. To that end, you are required to develop a security policy awareness guidance for your company that will address the importance of the having such policy within the organisation premises for employees and visitors.

Task 4:

  • Conclusion
  • Overall recommendations:                                                                                                                                                                                                                        On implementions on potential solutions in task 2                                                                                                                                                                          On how task 3 can be implemented
  • Reference List           

support
close