Element 1: For the practical part of this assignment, you will have to build Virtual Machines (VM), an exemplar scenario is clarified below but you can choose a different setup:
1. A Server
o You could use a Linux (e.g. CentOS, Ubuntu Server), or a Windows Server o Minimumconfigurationrequired
▪ Two services of your own choice (e.g. DHCP, FTP, SMTP, SNMP, Web etc)
2. A Client
o Could be either Windows (Visa, 7, 8, 10 etc) or Linux (Fedora, Ubuntu etc) o You could create multiple copies of the client’s VM if you require more
clients to demonstrate an attack 3. Attacker machine
Element 2: For this element, you are required to reference peer-reviewed papers.
In this first part of the assignment, you are required to plan and demonstrate a case study of offensive security:
Provide a summary of the configuration steps (e.g. for the server and client machines). Include screenshots to show that the environment is functional (e.g. to evident functionality at the client-side). Discuss the rationale behind service selection and configuration.
Demonstrate a minimum of 2 attacks in total against the services configured. Any further and complex attack steps will attract more marks. Log all the important and offensive events against your target including attacks detected, services’ logs nature, the origin of the attack and damage caused. Support your demonstration with screenshots.
Critically reflect on countermeasures and prevention mechanisms applied to mitigate against your attacks.
Word count for Element 1 is 2000 words (+/- 10%) excluding references. Make sure you write the wordcount of Element 1 in your submission.
4 freelancer chào giá trung bình$176 cho công việc này
Hi thanks for your nice post. This lab environment I already setting up I can write a good documentation for ethical hacking. I have online training access permenetly. Please discuss for assistance. Thanks