100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Essay

Systems Penetration Testing TM359 TMA01

Rating
-
Sold
3
Pages
37
Grade
A
Uploaded on
08-05-2024
Written in
2023/2024

TMA01 TM359 Systems Penetration Testing

Content preview

Question 1
Part A

The scanning stage of the CEH methodology involves reviewing the target system to identify

vulnerabilities and entry points (Packetlabs, 2023).


Two tactics from the MITRE ATT&K matrix that can be applicable in the CEH scanning stage:

“Active Scanning” and “Network Service Scanning” the former involves systematically

probing the target network for active services to uncover vulnerabilities, while the latter

scans the adversary network for active services and open ports, unveil vulnerabilities and

entryways. These tactics align with the scanning stage’s objectives.


Two tactics from the MITRE matrix that are not directly applicable to the scanning stage: “OS

Credential Dumping” which involves obtaining login and password information from the

target operating system, and “Command and Script Interpreter” which utilises execute

commands and script on target systems. While essential in later stages of the attack life

cycle, they do not directly contribute to the scanning process.

, Z7138375


Part B

The Computer Misuse Act (1990) delineates illegal use of digital operations in the UK.


Section 1 criminalises ‘unauthorised access to computer material’, individuals knowingly at

the time of accessing or performing any function to secure access to a system, knew that

they were unauthorised to do so.


Section 2 criminalises ‘intent to commit or facilitate commission of further offences. Once

guilty under Section 1, can be found guilty under this section even though the facts are such

that a further offence is impossible.


Section 3 relies on a crime under Section 1 having been committed and adds further offences

of ‘acts with intent to impair; or with recklessness as to impairing, operations of computers’,

acts that damage or alter the content of a computer system, through introducing malware,

or the effects caused by the unauthorised access.


Two penetration test breaches of the Act include unauthorised access, regardless of intent,

and system damage intentionally or unintentionally without authorisation.


To safeguard themselves, penetration testers must adhere and stay within the limitations set

in the pre-engagement and scope stages. The Penetration Testing Execution Standards (PTES)

(2022) which underscore that neglecting to thoroughly prepare and complete this stage may

result in legal repercussions/complications. Preparing and obtaining written permission

before testing are crucial steps to avoid legal consequences. Figure 1.0 summarises

protective measures against unlawful testing (Parker, 2023).

Document information

Uploaded on
May 8, 2024
Number of pages
37
Written in
2023/2024
Type
ESSAY
Professor(s)
Unknown
Grade
A

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Rekah The Open University
View profile
Follow You need to be logged in order to follow users or courses
Sold
119
Member since
3 year
Number of followers
69
Documents
28
Last sold
1 week ago

3.4

14 reviews

5
5
4
3
3
1
2
2
1
3

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions