Discuss penetration testing methodologies

Assignment Help Other Subject
Reference no: EM133263349

Practical Pen Testing - Security Audit

Learning Outcome 1: Use appropriate tools to discover the structure of a network, the services running on it, and identify and classify potential security flaws

Learning Outcome 2: Demonstrate understanding of the core theoretical concepts that lead to insecurity in computer systems, and how there can be used to exploit and mitigate threats identified in a computer system or network

Learning Outcome 3: Discuss common penetration testing methodologies, vulnerability risk rating systems and how they relate to the security audit process

Task

In this coursework you are required to perform a security audit of a set of hosts.

It is a portfolio style activity, where you will submit the flags found in three, of the weekly lab tasks, and write a brief report on your findings. You have free choice over two of the machines, but your report must include a writeup on one of the buffer overflow based boxes.
The individual machines will be provided as Challenge tasks during the lab sessions, in the second half of the module.

The tasks that can be submitted as part of the coursework will be identified as Coursework Tasks in the weekly documentation.

Each of the challenge and will consist of Boot To Root Style challenges, where you will be need to use appropriate tools and techniques to identify, and exploit potential vulnerabilities.
You will need to complete an appropriate pen-test process for each of them. This may include:
Reconnaissance
Initial Exploitation
Post Exploitation identification of vulnerabilities Post Exploitation

The machines will consist of

1) Machine 1. A more machine demonstrating concepts from the module. Marks will be allocated for following appropriate stages of the pen test process. 2) Machines 2, and 3: Two targets where you will have to identify and exploit a real-world vulnerability. - For Machine 2, this may include exploiting a well-known or documented issue. - For Machine 3, this may include developing a custom exploit for a published issue

Penetration Test Report

In this assignment you will need to write a comprehensive pen-test report on ONE of the challenge systems provided in the labs.

Unlike in CW1 where you are expected to give an overview of the portfolio tasks. The report should be aimed at a non technical audience, and provide a detailed description of the process used to identify any vulnerabilities, methods used to exploit, and relevant suggestions for mitigation.

You should refer back to the generic pentest process discussed in the class, and discuss how the information gathered at each stage informed the decisions made.

You will also need to provide some discussion around the issues discovered. Providing an explanation of the cause of the problems, links to other similar real world examples, discussion of the risk involved.

Example Pen Test Process
A Generic Penetration test process discussed in class was:
Scope Reconnaissance Exploitation Post-Exploitation
Your report should address each of these stages:

SCOPE
As there is no formal contract defined, your scope stage should discuss any assumptions you make around the process. What methods of testing are you going to use, are there elements that are out of scope etc.

Reconnaissance
Discussion of recon methodology, and any tools used. Results, and analysis of the reconnaissance phase. This may stage should also include any reconnaissance from post initial foothold on the system.

Exploitation
Description of any tools, techniques and strategies for the exploitation phase. Discussion of the vulnerabilities found, and how you were able to exploit them.
As with reconnaissance, this should include details of any further exploitation after the initial foothold.

Post Exploitation
Suggestions for mitigation, and any other post-exploit tasks carried out.

Attachment:- Practical Pen Testing.rar

Reference no: EM133263349

Questions Cloud

Describe what happens when a neuron fires : Imagine that your hand is a neuron. What would your palm, arm, and fingers represent? Describe what happens when a neuron "fires" and how neurons send messages
Developed some valuable new medical products : A small Canadian ?rm that has developed some valuable new medical products using its unique biotechnology know
What is the academic meaning of the word myth : What is the academic meaning of the word myth? For extra help try this site: Academic Meaning of Myth.
What problems confronted the roman catholic religion : What problems confronted the Roman Catholic religion and its leadership during the Late Middle Ages?
Discuss penetration testing methodologies : Practical Pen Testing - Security Audit Discuss common penetration testing methodologies, vulnerability risk rating systems and how they relate to the security
Good credit ratings and are well-known the exporter : Do you agree that consignment should only be used with overseas customers that have really good credit ratings and are well-known the exporter?
How does the tutankhamun mask prompt viewers : How does the Tutankhamun mask (Tomb) prompt viewers to consider their values in this world and contemplate what might follow after death?
What are probability and nonprobability sampling designs : What are probability and nonprobability sampling designs? Why is there a trade-off between precision and confidence?
Mandatory evaluation criteria : Develop the basis of selection and evaluation criteria for statement of work. your group must create an evaluation grid

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd