IT Security
MITS 5004
Assessment Item 3
Group Presentation:
Research Security vulnerability tools using Kali (Linux)
As a
group, present for approximately 30 minutes on one of the following topics.
Groups need to self-organise in earlier weeks, and choose a topic in-class.
Tutors will ensure that no two groups have the same topic. This task requires
you to create a Kali hacking tools presentation by researching, experimenting
with and explaining hacking tools features. After completing this task you
should be able to use built in tools in Linux Kali to do vulnerability testing
for the systems.
You should select one tool from the following
list (if you want to select any other tool from Kali, please discuss with
tutor):
•
Hydra
•
Maltego
•
NMap
•
Zed Attack Proxy
•
SqlMap
•
Metasploit Framework
•
Burp Suite
You are required to investigate your selected
tool and explain the syntax of the commands you use. Your presentation must
include at least 6 screenshots that demonstrate different features of the tool.
Your presentation should be sufficiently
detailed to enable audiences to be able to use the tool.
You can prepare the presentation on the selected
tool containing following headings;
1.
Introduction of the tool
2.
Features of the tool
3. Techniques used by the tool to exploit
vulnerabilities of information systems
4. Experimental setup and evidence of usage of the
tool. Include screenshots of vulnerability testing.
5.
Conclusions
6.
References
Presentations will be 5 minutes, multiplied by
the number of people in your group. If there are more groups than topics, then
topics can be done by more than one group, at the tutor’s discretion.
Groups must contain either 4 or 5 students as
default – if a small group is formed (such as having two students remaining),
then the tutor will re balance the groups to ensure that there are no “small”
groups. Only in exceptional cases will groups of a different size be allowed.
See the scoring sheet for this assignment, which
is on the next page, and ensure that your presentation fulfills the criteria
listed. All students in the same group get the same mark for
“Content”, while “Presentation” marks are assigned
individually. Your final mark is the sum of the two.
Marking
Scoring
Question
|
Score
|
Description
|
||
Contents of
Presentation
|
||||
1
|
Introduction
of
|
10
|
Comprehensive
introduction given
|
|
the tool
|
||||
2
|
Features
of the
|
15
|
Full
list of features is given
|
|
tool
|
||||
3
Techniques used
|
15
|
Techniques
used by the tool to exploit vulnerabilities of
|
||
information systems
|
||||
4
|
Experimental
|
15
|
Experimental
setup and evidence of usage of the tool.
|
|
setup
|
Include screenshots of vulnerability testing
|
|||
5
|
Conclusions
|
10
|
Conclusion
indicate full understanding of the tools
|
|
6
|
References
|
5
|
List
given
|
|
Subtotal:
|
70
|
Subtotal
for content
|
Presentation
|
||
Presentation
style
|
10
|
The
presenter is confident, understandable and well-
|
material will lose marks.
|
||
Presentation
and
|
10
|
How well
has the topic been covered? Were significant
|
contents
|
aspects ignored? Were the descriptions
accurate?
|
|
Have all the stated requirements been
fulfilled. For
|
||
instance screenshots and justifications.
|
||
Time
|
10
|
The
presenter uses their time appropriately, neither going
|
under time nor over time.
|
||
Subtotal:
|
30
|
Subtotal
for presentation
|
Total:
|
100
|
Comments
Post a Comment