Assignment help

Join our 150К of happy users

Get original papers written according to your instructions and save time for what matters most.

Card image cap

Ethical Hacking Coursework Assignment Help

Ethical Hacking Coursework Assignment Help

 

This coursework is work 50% of your overall final grade.

The coursework for this module is to write a report on ONE vulnerability test that you conducted on an operating system on a virtual machine. You may choose any type of vulnerability testing; however, you will need to have agreement from your module tutor/s in order to proceed. Please be aware that some of the techniques for performing this work are only taught at the end of the module so it would be wise to do some research beforehand into ONE vulnerability so that you can perform the tests as soon as you gain the necessary skills.

 

Please remember the following:

  • All work on this coursework, MUST BE CONDUCTED WITHIN THE LAW. Please refer to the Computer Misuse Act, if in any doubt consult your tutors, or seek legal advice.
  • Please remember that this work is INDIVIDUAL WORK, however, working collaboratively with other students may be possible, you must write your own report and produce your own unique set of results.
  • Your work must be your own work. If your work is found to be authored by another person, it will be investigated!
  • Reference your work according to the Harvard Referencing style.
  • Your work will be submitted via Turnitin on submission.
  • WORD COUNT FOR THE REPORT IS NO MORE THAN 1500 WORDS. References are not part of the word count.
  • YOU ARE EXPECTED TO FOLLOW THE REPORT STRUCTURE STRICTLY ANY DEVIATION FROM THE REPORT STRUCTURE WILL MEAN YOU WILL NOT BE MARKED FOR WORK DONE  OUTSIDE OF THAT.
  • If you miss out any section you will lose marks.

Report Structure

Introduction (5 marks)

The introduction must provide a brief overview of the report, it should include a brief description of the type of vulnerability test you will perform and a description of the vulnerability you are investigating.

 

Research into Vulnerabilities (15 Marks)

This section needs to provide some evidence that you have conducted research into vulnerabilities associated with your chosen OS. You need to briefly describe the vulnerability you are intending to investigate; your research should also include possible remedies to this vulnerability. Select ONE Vulnerability only from https://cve.mitre.org/index.html. Clearly state the CVE reference number of the selected one.

 

Vulnerability Test Rationale (10 Marks)

Provide a brief justification of the vulnerability test you intend to perform, what information or intelligence will the test provide you, how can it provide you with a strategy for mitigating against the effects of your chosen vulnerability.


 

Methodology (10 Marks)

Provide detailed evidence of how the vulnerability testing was conducted. You may wish to use screenshots with descriptions for this part of your report. Make sure that the screenshots are of a suitable size and easily readable.

 

Detailed Findings (40 Marks in total (10 marks per section))

(This section may be put into a table)

For the vulnerability you found, give a description of the following:

 

Source of the vulnerability (10 Marks out of the 40 Marks for this section)

Describe the source and root cause of the vulnerability. This may be in OS software or software commonly installed and used, for example, MS Office, or it could be a protocol like NetBios or TCP.

 

Impact of the vulnerability (10 Marks out of the 40 Marks for this section)

Give an assessment of the impact if the vulnerability was exploited

 

Likelihood of the vulnerability being exploited (10 Marks out of the 40 Marks for this section) Give an assessment of the probability of the vulnerability being exploited. . Use this calculator and provide proofs.

https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator

 

 

Overall Risk Assessment (10 Marks out of the 40 Marks for this section)

Give a summary of your overall assessment of the vulnerability you have discovered.

 

Recommendations (10 Marks)

Give your recommendations for dealing with and removing the vulnerability you have found and described in your report.

 

Appendix (5 Marks)

Any information relevant to the vulnerability testing.

 

References (5 Marks)

Provide a list of references, this may include books, journals, web sources or other. YOUR REFERENCES MUST BE IN THE HARVARD REFERENCING FORMAT.

 

Looking for reliable academic support in India? Try Punjab Assignment Help for top-quality, plagiarism-free solutions delivered on time—trusted by students across Punjab and beyond!

Send Your assignment brief

Share your assignment brief and after Checking assignment requirement expert Will share the quote

Get Quote and pay

Once quote is sent, you can make Payment through secure option after which our team will start work

Get Assignment

Our team will Deliver the work you can share If any feedback