Assignment 1 (Final)
GENC Muhammed
STUDENT ID: 20021350
SUBJECT: ETHICAL HACKING
,Table of Contents
Task 1: Cyber Attacks...............................................................................................................2
Introduction.............................................................................................................................................2
Discussion of five attacks:........................................................................................................................2
Conclusion:..............................................................................................................................................6
Task-2: Network Traffic Analysis..............................................................................................7
Network security tools:............................................................................................................................7
Network Traffic Analysis:.........................................................................................................................7
Benefits of Network Traffic Analysis:.......................................................................................................8
Wireshark:...............................................................................................................................................9
Kali Linux:...............................................................................................................................................10
Packet Capturing File Analysis:..............................................................................................................11
References:............................................................................................................................18
1
, Task 1: Cyber Attacks
Introduction
The term Ethical hacking is the practice of hacking into a network by an individual or a company
to determine where potential security threats may originate within the organization's computer
network. It is then necessary to manipulate the information that the ethical hacker has
discovered in order to address potential threats and strengthen the computer network as
needed. It is the process of bypassing or cracking security measures that have been
implemented by a system in order to identify vulnerabilities, data breaches, and potential
threats. It is only considered ethical if the regional or organizational cyber laws/rules are
followed in the process. Penetration testing is the term used to describe this job informally. As
the name implies, this practice entails attempting to infiltrate a system and documenting the
steps taken because of the attempt.
Discussion of five attacks:
In the below section of the report, the selected platform is the IoT. And based on this platform
the selected 5 attacks are-
a. DoS attack,
b. Password attack,
c. SQL injection,
d. Phishing and
e. Cross-site scripting
DoS attack vector:
An attack associated with Distributed Denial-of-Service associated with overloading a website
and rendering it inoperable in order to cause traffic to be diverted away from it. However,
attacks are typically transferred out with the guidance of botnets that are used to overwhelm a
website's ability to respond to requests until the site is no longer functional (Georg et al., 2018).
2