Discovering operating system and architecture

Assignment Help Other Subject
Reference no: EM133311810

Create your security case study by choosing a specific domain/s to do your penetration testing and risk assessments and countermeasures.
Make sure to take permission before starting the assignment.

Passive security artefacts, accepted, in the case of facing any difficulties obtaining the permissions.

Learning Outcome 1: Formulate an attack strategy to penetrate cloud-based systems within legal boundaries and accepted scope.

Learning Outcome 2: Recommend remedies for compromised cloud systems..

Learning Outcome 3: Explain the extent and impact of an attack using a forensic approach

Learning Outcome 4: Employ attack strategies to attempt to penetrate a target computer system

Section A)

Scanning is a set of procedures for identifying live hosts, ports, and services, discovering Operating system and architecture of the target system, Identifying vulnerabilities and threats in the network. Network scanning is used to create a profile of the target organisation.
Scanning refers to collecting more information using sophisticated and aggressive reconnaissance techniques

1) Use nmap, zenmap, netscan, masscan. Scapy and hping3 tools from Kali Linux to scan Metasploit Virtual machine,
Critically analyse the results to show the open ports and the services running on different ports and highlight on the advanced features in nmap.
Perform another sweep scanning on a specific network using the zenmap to draw The Network Topology.

Section B)
1- Perform a thematic literature review, on the latest development in the field of Intrusion Detection and Prevention (IPS/IDS), using anomaly, protocol, and signature inspection methods.
Use scholarly articles, books, and other sources (e.g., dissertations, conference proceedings) to insightfully and critically surveyed relevant literature.
2- Use Snort as IDS to detect ICMP, nmap , hping3, create your own rules to alert about any tcp connection from any external source to our ssh port.

Section C)
1. Evaluate the digital forensic memory analyses in terms of the processes, pslist, pstree, LdrModules, hashdump, and other volatility plugins to get significant digital evidence.

2. Assuming that a forensic team follows the standard steps for preserving evidence integrity and keeping an unbroken chain of custody, what did they do to convince the court, and why they have done so?

Section D)
1- Critically compare the MSF and Armitage. Support your answer with examples.
2- Give an example of using MSF to exploit a vulnerability in a remote system support your case with screenshots, and try to show your ability in solving different technical issues.

Attachment:- Advanced Cloud Penetration.rar

Reference no: EM133311810

Questions Cloud

Mechanisms of fiscal and monetary policy : What are the mechanisms of fiscal and monetary policy?
Review of related literature regarding the decisions area : Containing problem statement, basic questions, and methodologies.Review of related literature regarding the decisions area of operations management
What monetary policy : Explain in detail what monetary policy is.
Do you think are the macedonians : From what you have read and heard about Philip and the Macedonians, do you think the Macedonians are, in fact, Greek or are they something else?
Discovering operating system and architecture : SEC7002 Advanced Cloud Penetration Testing and Forensics - Formulate an attack strategy to penetrate cloud-based systems within legal boundaries and accepted
Decrease in money demand on the output-interest rate : Use the money market diagram and the IS-LM-FX model to show graphically the effects of a decrease in money demand on the output, interest rate,
What is the most important department in your company : Do you recommend that your chosen business employ a market orientation?What is the most important department in your company for your marketing team
Highest ability then marginal tax rate : We showed in class that if there is a person with the highest ability then the marginal tax rate for that person should be set to zero
Explain relation to the ancient mediterranean world : For each one, should write a paragraph (300 to 400 words) that explains-in relation to the ancient Mediterranean world-what the term means.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd