Assessment Brief
- With regards to 2 rooms on TryHackMe platform, you are required to demonstrate your ability to carry out advanced exploitation techniques by creating a penetration testing methodology. Specifically, you are required to perform and report on the following(Suggested word count 2000):
***We may request a presentation of your work if there are any concerns regarding the quality or execution of the assessment.***
- Design of a methodology
- Host enumeration and fingerprinting
- Service enumeration and fingerprinting
- Vulnrebility scanning
- Vulnrebility exploitation
Please consider the links below for 2 machines that need to be completed for this assessment:
- Room 1:
https://tryhackme.com/jr/shuroom1
- Room 2:
https://tryhackme.com/jr/shuroom2
Marking Criteria |
Comment |
Weight |
Methodology Design |
This section focuses on
Firstly, a clear methodology should be presented, with sufficient detail so that a technical reader can understand the approach taken and what each stage. attempts to do. This can include but is not limited to:
|
10% |
Methodology Effectiveness & Efficiency |
This section focuses on
The report should then reflect you executing each step of the methodology. It should show each stage being executed efficiently with the least number of commands used, each command should run with the optimal options. The way the tools/commands are used should simulate attack from a malicious hacker. The output of the commands should also be show clearly and the output should be in its most efficient form. Or with a filter (i.e grep) used to extract the most important/key pieces of information Overall – You should show the execution of each step of the Ethical Hacking Methodology you present. Marks are awarded for how effective and efficient you are. |
10% |
Specific Results |
This section focuses on each machine.
|
70% |
Report Summary |
A technical and management summary are both presented which are tailored for each audience and highlight the key findings and approach |
10% |