Write My Paper Button

WhatsApp Widget

With regards to 2 rooms on TryHackMe platform, you are required to demonstrate your ability to carry out advanced exploitation techniques by creating a penetration

Share this post on:

Assessment Brief

  1. With regards to 2 rooms on TryHackMe platform, you are required to demonstrate your ability to carry out advanced exploitation techniques by creating a penetration testing methodology. Specifically, you are required to perform and report on the following(Suggested word count 2000):

***We may request a presentation of your work if there are any concerns regarding the quality or execution of the assessment.***

  1. Design of a methodology
  2. Host enumeration and fingerprinting
  3. Service enumeration and fingerprinting
  4. Vulnrebility scanning
  5. Vulnrebility exploitation

Please consider the links below for 2 machines that need to be completed for this assessment:

  • Room 1:

https://tryhackme.com/jr/shuroom1

  • Room 2:

https://tryhackme.com/jr/shuroom2

Marking Criteria

Comment

Weight

Methodology Design

This section focuses on

  • Design of a methodology

Firstly, a clear methodology

should be presented,

with sufficient detail so that a technical reader can

understand the approach taken and what each stage.

attempts to do.

This can include but is not limited to:

  • The types of scans performed.

  • The types of vulnerabilities assessed.

  • The techniques used.

  • The tools to be used

10%

Methodology Effectiveness & Efficiency

This section focuses on

  • Host enumeration and fingerprinting

  • Service enumeration and fingerprinting

  • Vulnerability Scanning

The report should then reflect you executing each step of the methodology. It should show each stage being executed efficiently with the least number of commands used, each command should run with the optimal options. The way the tools/commands are used should simulate attack from a malicious hacker. The output of the commands should also be show clearly and the output should be in its most efficient form. Or with a filter (i.e grep) used to extract the most important/key pieces of information Overall – You should show the execution of each step of the Ethical Hacking Methodology you present. Marks are awarded for how effective and efficient you are.

10%

Specific Results

This section focuses on each machine.

  • Vulnerability Exploitation

  • A clear and concise description of what the vulnerability is.

  • A comment or indicator on how serious the issue is

  • A repeatable example should be given.

  • An explanation on why each item presents a security risk.

  • Advice on how to fix/remediate the issues found.

70%

Report Summary

A technical and management summary are both presented which are tailored for each audience and highlight the key findings and approach

10%

Share this post on:

Affordable and Dependable Platform for Your Academic Assignments

X