100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

Ethical Hacking - Assignment 1 ()

Rating
-
Sold
1
Pages
20
Uploaded on
09-02-2022
Written in
2021/2022

This assignment fully covers the following and has carefully been checked to achieve top marks possible. Part A & B 1. EXPLAIN AND CRITICALLY DISCUSS THE ETHICAL ISSUES RELATING TO THE PERFORMANCE OF PENETRATION TESTING. 2. EXPLAIN AND ANALYSE THE STAGES REQUIRED BY AN ETHICAL HACKER TO SUCCESSFULLY COMPROMISE A TARGET. 3. DEMONSTRATE A CRITICAL KNOWLEDGE OF THE TOOLS, METHODS AND PROCEDURES USED WITHIN THE NETWORK SECURITY ARENA.

Show more Read less
Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
February 9, 2022
Number of pages
20
Written in
2021/2022
Type
Other
Person
Unknown

Subjects

Content preview

15/01/2022 Ethical Hacking –
Assignment 1 (Final)




GENC Muhammed
STUDENT ID: 20021350
SUBJECT: ETHICAL HACKING

,Table of Contents
Task 1: Cyber Attacks...............................................................................................................2
Introduction.............................................................................................................................................2
Discussion of five attacks:........................................................................................................................2
Conclusion:..............................................................................................................................................6
Task-2: Network Traffic Analysis..............................................................................................7
Network security tools:............................................................................................................................7
Network Traffic Analysis:.........................................................................................................................7
Benefits of Network Traffic Analysis:.......................................................................................................8
Wireshark:...............................................................................................................................................9
Kali Linux:...............................................................................................................................................10
Packet Capturing File Analysis:..............................................................................................................11
References:............................................................................................................................18




1

, Task 1: Cyber Attacks

Introduction
The term Ethical hacking is the practice of hacking into a network by an individual or a company
to determine where potential security threats may originate within the organization's computer
network. It is then necessary to manipulate the information that the ethical hacker has
discovered in order to address potential threats and strengthen the computer network as
needed. It is the process of bypassing or cracking security measures that have been
implemented by a system in order to identify vulnerabilities, data breaches, and potential
threats. It is only considered ethical if the regional or organizational cyber laws/rules are
followed in the process. Penetration testing is the term used to describe this job informally. As
the name implies, this practice entails attempting to infiltrate a system and documenting the
steps taken because of the attempt.

Discussion of five attacks:
In the below section of the report, the selected platform is the IoT. And based on this platform
the selected 5 attacks are-

a. DoS attack,
b. Password attack,
c. SQL injection,
d. Phishing and
e. Cross-site scripting

DoS attack vector:

An attack associated with Distributed Denial-of-Service associated with overloading a website
and rendering it inoperable in order to cause traffic to be diverted away from it. However,
attacks are typically transferred out with the guidance of botnets that are used to overwhelm a
website's ability to respond to requests until the site is no longer functional (Georg et al., 2018).




2

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
johnatkinson Staffordshire University (London)
Follow You need to be logged in order to follow users or courses
Sold
1536
Member since
6 year
Number of followers
996
Documents
18
Last sold
6 months ago
BTEC National Extended Diploma IT Level 3 (RQF 2016/17) Resources

Hello and welcome to my page! My target is to help the students pass courseworks and those that aim to be achieving top marks (i.e Merit/Distinction). I had recently been new to this website for about a few months ago and I do feel amazed to bring all the content I have and release to the public for delivering their support plus guiding them through step by step. My assignments are mostly 100% plagiarism-free containing useful content and headings to cover all grade criteria. Payment is 100% reliable! If you have any particular problem? simply contact me and you will be refunded. 100% Money Back Guarantee Coming soon: Furthermore, I will be publishing assignments for Cyber Security BSc (hons) soon which may be able to fulfil your expectations and satisfactions, stay updated with the latest news!

Read more Read less
3.7

390 reviews

5
167
4
86
3
52
2
24
1
61

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions