100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Ethical Hacking - Assignment 1 () £13.99
Add to cart

Other

Ethical Hacking - Assignment 1 ()

 1 purchase

This assignment fully covers the following and has carefully been checked to achieve top marks possible. Part A & B 1. EXPLAIN AND CRITICALLY DISCUSS THE ETHICAL ISSUES RELATING TO THE PERFORMANCE OF PENETRATION TESTING. 2. EXPLAIN AND ANALYSE THE STAGES REQUIRED BY AN ETHICAL HACKER TO SUC...

[Show more]

Preview 3 out of 20  pages

  • February 9, 2022
  • 20
  • 2021/2022
  • Other
  • Unknown
All documents for this subject (1)
avatar-seller
johnatkinson
15/01/2022 Ethical Hacking –
Assignment 1 (Final)




GENC Muhammed
STUDENT ID: 20021350
SUBJECT: ETHICAL HACKING

,Table of Contents
Task 1: Cyber Attacks...............................................................................................................2
Introduction.............................................................................................................................................2
Discussion of five attacks:........................................................................................................................2
Conclusion:..............................................................................................................................................6
Task-2: Network Traffic Analysis..............................................................................................7
Network security tools:............................................................................................................................7
Network Traffic Analysis:.........................................................................................................................7
Benefits of Network Traffic Analysis:.......................................................................................................8
Wireshark:...............................................................................................................................................9
Kali Linux:...............................................................................................................................................10
Packet Capturing File Analysis:..............................................................................................................11
References:............................................................................................................................18




1

, Task 1: Cyber Attacks

Introduction
The term Ethical hacking is the practice of hacking into a network by an individual or a company
to determine where potential security threats may originate within the organization's computer
network. It is then necessary to manipulate the information that the ethical hacker has
discovered in order to address potential threats and strengthen the computer network as
needed. It is the process of bypassing or cracking security measures that have been
implemented by a system in order to identify vulnerabilities, data breaches, and potential
threats. It is only considered ethical if the regional or organizational cyber laws/rules are
followed in the process. Penetration testing is the term used to describe this job informally. As
the name implies, this practice entails attempting to infiltrate a system and documenting the
steps taken because of the attempt.

Discussion of five attacks:
In the below section of the report, the selected platform is the IoT. And based on this platform
the selected 5 attacks are-

a. DoS attack,
b. Password attack,
c. SQL injection,
d. Phishing and
e. Cross-site scripting

DoS attack vector:

An attack associated with Distributed Denial-of-Service associated with overloading a website
and rendering it inoperable in order to cause traffic to be diverted away from it. However,
attacks are typically transferred out with the guidance of botnets that are used to overwhelm a
website's ability to respond to requests until the site is no longer functional (Georg et al., 2018).




2

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller johnatkinson. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £13.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

69988 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 15 years now

Start selling
£13.99  1x  sold
  • (0)
Add to cart
Added