Command and control project report and presentation

Assignment Help Computer Network Security
Reference no: EM133872018 , Length: word count:2000

Ethical Hacking and Penetration Testing

Assessment: Command and Control Project Report and Presentation

Introduction
In this group assessment, students will form teams of 2-3 students.

In a live simulated war-room event (3hrs), students will create a command and control centre and attempt to take control of several machines. However, on the same network other students are also using command and control centre to take over the same victim network. The victim network is made of routers, switches, servers and end-user devices controlled by an active AI. Once you take control of a victim machine you are to secure it and block others from taking over it. Your team can take over a victim machine that has already been conquered by another group's command and control. Get online assignment help in the USA!

You are required to document your command and control centre methods throughout the entire MITRE Kill-chain. Also include an analysis of the automation behind the scene and the environment. You will need to setup the Caldera MITRE with command and control centres. You will need to access them over a LAN network where several other teams can access (e.g. the lab via Wifi). There will be several virtual machines on the network.

Prior to this event you will develop blue and red teams playbooks in Caldera MITRE. Then deploy playbooks in the live event. This includes creating blue teams scripts. At the live event you are given a blank Operating System to harden (will be a server or something with a server application). There may be some unattended virtual machines on the network.

The method of the report must show your penetration command and control strategy with logical justification. Your defences commands and methodology. An analysis of the environment and AI tools defending themselves, in additional to other attack predators out there. After conquering a victim, explain how you locked the victim out and other attackers such that machine can not be overtaken by others.

Reference no: EM133872018

Questions Cloud

Analyze business-level strategy of familiar company : Analyze the business-level strategy of a familiar company or one you've previously worked for, focusing on its practical application in the real-world business
Define maslow hierarchy of needs theory : Define Maslow's Hierarchy of Needs theory and the ways it benefits leadership
Evolutionary concepts to improve human livelihood : How have we employed evolutionary concepts to improve human livelihood
Despite high level of information available to consumers : Despite the high level of information available to consumers and competitors, technological advancements can create some asymmetry,
Command and control project report and presentation : Command and Control Project Report and Presentation - develop blue and red teams playbooks in Caldera MITRE. Then deploy playbooks in the live event
Apply the key concepts of international marketing : Apply the key concepts of international marketing, including the critical evaluation and the application of key tools, models and theories
Provide a deeper understanding of market potential : Provide a deeper understanding of market potential by evaluating factors like consumer sustainability awareness, brand alignment with local values
What were the political economic and cultural ramifications : What were (and still are) the political, economic and cultural ramifications of the US imperial legacy, specifically regarding Puerto Rico?
Explain the strengths and weaknesses of each policy : Explain the strengths and weaknesses of each policy. Explain how the health policy you selected might impact the role of the nurse in each country.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd