IT Security
MITS 5004
IT SECURITY
Assignment-3
Assignment
3
Research
and Presentation on security vulnerability tools using Kali Linux
1. Group Formation
For this assignment, students need to form
groups of 4 to 5 members under the supervision of Lecturer/Tutor. Each group
must be formed of 4 to 5 students. In case there is a small group (such as with
remaining two students), then the Lecturer/Tutor can rebalance the groups to
ensure that there are no “small” groups.
2. Topic Selection
Each group needs to select one of the following
security vulnerability testing tools of Kali Linux on a first come first served
basis:
·
Hydra
·
Maltego
·
NMap
·
Zed Attack Proxy
·
SqlMap
·
Metasploit Framework
·
Burp Suite
If there are more groups than the number of
available topics, then one topic can be selected by more than one group. This
should be arranged under the discretion of Lecturer/Tutor.
If a group wants to select a security
vulnerability testing tool of Kali Linux that is not listed above, the group
needs to discuss this with the Lecturer/Tutor.
3. Deliverables
Members of
each group need to learn the usage of the selected tool of Kali Linux. For this
students
need to research, install, and use Kali Linux and the selected tool. After sufficient study and hands on experience, each group needs to prepare and
submit a report, and orally present their understanding on the selected tool
and Kali Linux as a whole (individual member presentation). Formats of report
and oral presentation are mentioned below.
3.1 Report
Each group needs to prepare a report (must be in PDF/DOC/DOCX) in the
following format (section headings):
1.
Introduction of the tool
2.
Features of the tool
3.
Techniques used by the tool to exploit
vulnerabilities of information systems
4. Experimental setup and evidence of usage of the
tool (include screenshots of vulnerability testing that you have performed)
5.
Conclusions
6.
References
The size of the report should be from 1500 to 1700 words. Report should include group number and member
information (member students’ name and students ID numbers).
3.2 Oral Presentation
Each
person in a group needs to perform oral presentation of the selected tool for 5
minutes.
The
presentation should be sufficiently detailed to enable audiences to be able to
use the tool.
The oral
presentation should (not limited to) include the following aspects:
·
Introduction to Kali Linux
·
Introduction to the selected tool of Kali Linux
· Features
of the tool
· Details
on the types of security vulnerability checks/attacks that can be carried out
with the tool
Each student needs to prepare a powerpoint/PDF presentation of 10-12 slides
and show it during the oral presentation. The powerpoint/PDF slides should
contain 5-6 screenshots of the experiements performed by the student.
NOTE: In case it is infeasible for conducting
oral presentation for all students, Lecturer/Tutor can allow students to make a
Video Presentation and upload in Moodle. In this case, the video should clearly
show the student presenting in person on the selected topic.
3.3 Moodle Submission
Students
are required to submit the followings through Moodle:
1.
Report (1500 to 1700 words): Must be in either PDF or DOC/DOCX format.
2.
Video Presentation (5 mins presentation): Must
be in mp4 or other similar format, and must be less than 100 MB size.
Comments
Post a Comment