Interested in a PLAGIARISM-FREE paper based on these particular instructions?...with 100% confidentiality?

Order Now

Group Presentation: Research Security vulnerability tools using Kali (Linux) Week 11 (Tutorial session), Worth 15% As a group, present for approximately 30 minutes on one of the following topics. Groups need to self-organise in earlier weeks, and choose a topic in-class. Tutors will ensure that no two groups have the same topic. This task requires you to create a Kali hacking tools presentation by researching, experimenting with and explaining hacking tools features. After completing this task you should be able to use built in tools in Linux Kali to do vulnerability testing for the systems. You should select one tool from the following list (if you want to select any other tool from Kali, please discuss with tutor): • Hydra • Maltego • NMap • Zed Attack Proxy • SqlMap • Metasploit Framework • Burp Suite You are required to investigate your selected tool and explain the syntax of the commands you use. Your presentation must include at least 6 screenshots that demonstrate different features of the tool. Your presentation should be sufficiently detailed to enable audiences to be able to use the tool. You can prepare the presentation on the selected tool containing following headings; 1. Introduction of the tool 2. Features of the tool 3. Techniques used by the tool to exploit vulnerabilities of information systems 4. Experimental setup and evidence of usage of the tool. Include screenshots of vulnerability testing. 5. Conclusions 6. References Presentations will be 5 minutes, multiplied by the number of people in your group. If there are more groups than topics, then topics can be done by more than one group, at the tutor’s discretion. Groups must contain either 4 or 5 students as default – if a small group is formed (such as having two students remaining), then the tutor will rebalance the groups to ensure that there are no “small” groups. Only in exceptional cases will groups of a different size be allowed. See the scoring sheet for this assignment, which is on the next page, and ensure that your presentation fulfils the criteria listed. All students in the same group get the same mark for “Content”, while “Presentation” marks are assigned individually. Your final mark is the sum of the two. Marking Scoring Question Score Description Contents of Presentation 1 Introduction of the tool 10 Comprehensive introduction given 2 Features of the tool 15 Full list of features is given 3 Techniques used 15 Techniques used by the tool to exploit vulnerabilities of information systems 4 Experimental setup 15 Experimental setup and evidence of usage of the tool. Include screenshots of vulnerability testing 5 Conclusions 10 Conclusion indicate full understanding of the tools 6 References 5 List given Subtotal: 70 Subtotal for content Presentation Presentation style 10 The presenter is confident, understandable and well-rehearsed. Students who read or do not understand the material will lose marks. Presentation and contents 10 How well has the topic been covered? Were significant aspects ignored? Were the descriptions accurate? Have all the stated requirements been fulfilled. For instance screenshots and justifications. Time 10 The presenter uses their time appropriately, neither going under time nor over time. Subtotal: 30 Subtotal for presentation Total: 100 Submission Procedure You (every group members) are required to submit your presentation. Your submission must be received before the due time/date as indicated in the course description.

 

Group Presentation: Research Security vulnerability tools using Kali (Linux)

Week 11 (Tutorial session), Worth 15%

 

 

As a group, present for approximately 30 minutes on one of the following topics. Groups need to self-organise in earlier weeks, and choose a topic in-class. Tutors will ensure that no two groups have the same topic. This task requires you to create a Kali hacking tools presentation by researching, experimenting with and explaining hacking tools features. After completing this task you should be able to use built in tools in Linux Kali to do vulnerability testing for the systems.

You should select one tool from the following list (if you want to select any other tool from Kali, please discuss with tutor):

·        Hydra

·        Maltego

·        NMap

·        Zed Attack Proxy

·        SqlMap

·        Metasploit Framework

·        Burp Suite

 

You are required to investigate your selected tool and explain the syntax of the commands you use. Your presentation must include at least 6 screenshots that demonstrate different features of the tool.

Your presentation should be sufficiently detailed to enable audiences to be able to use the tool.

You can prepare the presentation on the selected tool containing following headings;

  1. Introduction of the tool
  2. Features of the tool
  3. Techniques used by the tool to exploit vulnerabilities of information systems
  4. Experimental setup and evidence of usage of the tool. Include screenshots of vulnerability testing.
  5. Conclusions
  6. References

 

Presentations will be 5 minutes, multiplied by the number of people in your group. If there are more groups than topics, then topics can be done by more than one group, at the tutor’s discretion.

Groups must contain either 4 or 5 students as default – if a small group is formed (such as having two students remaining), then the tutor will rebalance the groups to ensure that there are no “small” groups. Only in exceptional cases will groups of a different size be allowed.

See the scoring sheet for this assignment, which is on the next page, and ensure that your presentation fulfils the criteria listed. All students in the same group get the same mark for “Content”, while “Presentation” marks are assigned individually. Your final mark is the sum of the two.

Marking

Scoring

Question Score Description
Contents of Presentation
1 Introduction of the tool

 

10 Comprehensive introduction given
2 Features of the tool

 

15 Full list of features is given
3 Techniques used 15 Techniques used by the tool to exploit vulnerabilities of information  systems
4 Experimental setup 15 Experimental setup and evidence of usage of the tool. Include screenshots of vulnerability testing
5 Conclusions

 

10 Conclusion indicate full understanding of the tools
6 References

 

5 List given
     
Subtotal: 70 Subtotal for content
Presentation
Presentation style

 

10 The presenter is confident, understandable and well-rehearsed. Students who read or do not understand the material will lose marks.

 

Presentation and contents

 

10 How well has the topic been covered? Were significant aspects ignored? Were the descriptions accurate?

Have all the stated requirements been fulfilled. For instance screenshots and justifications.

 

Time 10 The presenter uses their time appropriately, neither going under time nor over time.
Subtotal: 30  

Group Presentation: Research Security vulnerability tools using Kali (Linux)

Week 11 (Tutorial session), Worth 15%

 

 

As a group, present for approximately 30 minutes on one of the following topics. Groups need to self-organise in earlier weeks, and choose a topic in-class. Tutors will ensure that no two groups have the same topic. This task requires you to create a Kali hacking tools presentation by researching, experimenting with and explaining hacking tools features. After completing this task you should be able to use built in tools in Linux Kali to do vulnerability testing for the systems.

You should select one tool from the following list (if you want to select any other tool from Kali, please discuss with tutor):

·        Hydra

·        Maltego

·        NMap

·        Zed Attack Proxy

·        SqlMap

·        Metasploit Framework

·        Burp Suite

 

You are required to investigate your selected tool and explain the syntax of the commands you use. Your presentation must include at least 6 screenshots that demonstrate different features of the tool.

Your presentation should be sufficiently detailed to enable audiences to be able to use the tool.

You can prepare the presentation on the selected tool containing following headings;

  1. Introduction of the tool
  2. Features of the tool
  3. Techniques used by the tool to exploit vulnerabilities of information systems
  4. Experimental setup and evidence of usage of the tool. Include screenshots of vulnerability testing.
  5. Conclusions
  6. References

 

Presentations will be 5 minutes, multiplied by the number of people in your group. If there are more groups than topics, then topics can be done by more than one group, at the tutor’s discretion.

Groups must contain either 4 or 5 students as default – if a small group is formed (such as having two students remaining), then the tutor will rebalance the groups to ensure that there are no “small” groups. Only in exceptional cases will groups of a different size be allowed.

See the scoring sheet for this assignment, which is on the next page, and ensure that your presentation fulfils the criteria listed. All students in the same group get the same mark for “Content”, while “Presentation” marks are assigned individually. Your final mark is the sum of the two.

Marking

Scoring

Question Score Description
Contents of Presentation
1 Introduction of the tool

 

10 Comprehensive introduction given
2 Features of the tool

 

15 Full list of features is given
3 Techniques used 15 Techniques used by the tool to exploit vulnerabilities of information  systems
4 Experimental setup 15 Experimental setup and evidence of usage of the tool. Include screenshots of vulnerability testing
5 Conclusions

 

10 Conclusion indicate full understanding of the tools
6 References

 

5 List given
     
Subtotal: 70 Subtotal for content
Presentation
Presentation style

 

10 The presenter is confident, understandable and well-rehearsed. Students who read or do not understand the material will lose marks.

 

Presentation and contents

 

10 How well has the topic been covered? Were significant aspects ignored? Were the descriptions accurate?

Have all the stated requirements been fulfilled. For instance screenshots and justifications.

 

Time 10 The presenter uses their time appropriately, neither going under time nor over time.
Subtotal: 30 Subtotal for presentation
Total: 100  

 

Submission Procedure

You (every group members) are required to submit your presentation. Your submission must be received before the due time/date as indicated in the course description.

Total: 100  

 

Submission Procedure

You (every group members) are required to submit your presentation. Your submission must be received before the due time/date as indicated in the course description.

Interested in a PLAGIARISM-FREE paper based on these particular instructions?...with 100% confidentiality?

Order Now