Faculty of Engineering, Environment and Computing 7024CEM Ethical Hacking
Assignment Brief
Coventry 6cte, University
Module Title Ethical Hacking ndividual Zohort (Sept/Jan/May) Module Code 7024CEM Coursework Title as. mot Assignment: Pentesting Assignment Hand out date: 27/1/2023 Lecturer Dr. C. Panchev Due date: 10/4/2023 Estimated Time (hrs): Word Limit’: 2000 Coursework type: Assignment % of Module Mark 100 Submission arrangement online via Aula: File types and method of recording: Single PDF file Mark and Feedback date (DD/MM/YY): Mark and Feedback method: via Aula Module Learning Outcomes Assessed: 1. Critically discuss the legality and scope of ethical hacking and critically evaluate the technical, legal and ethical issues relating to its application in different environment. 2. Interpret and evaluate penetration testing methodologies and security assessment tools based on the scope, requirements and technologies of the system. 3. Evaluate the security of a system via penetration tests, using an appropriate methodology, analyse potential vulnerabilities related to organisational, policy or technical issues. 4. Evaluate and report the outcomes of a penetration test to a professional standard, recommending and specifying suitable countermeasures. Instructions You will be given a number of Virtual Machines representing a small office of an SME. You are required to perform a Professional Penetration Testing examination and write a report about your findings and recommendations to improve the security of the system. The report should have the following (or equivalent) structure: 1. Reconnaissance and target analysis 2. Exploitation (describing in detail the steps you have taken, tools you used) 3. Post-exploitation 4. Recommendations (how to make the target machines secure – this should address all vulnerabilities which you have identified in your assessment, not just the ones you have exploited)
This document is for Coventry University students for their own use in completing their assessed work for this module and should not be passed to third parties or posted on any website. Any infringements of this rule should be reported to facullyregisby.eececoventry.ac.uk.
5. Conclusions (this should contain Assessment of your work and also describe some alternative approaches you could have taken)
You do not need to provide an Executive Summary. Sections 1-3 of report should contain appropriate screen-shots and sample sessions from your work and any references supporting your findings/decisions. Asa guide, your report should be about 2000 words.
You are to prepare and formally deliver a verbal presentation of your findings and conclusions from your Penetration Test, to an audience of academics. The presentation should be up to 5 minutes after which there will be a question and answer session lasting for approximately 5 minutes. As part of the questions session, you may be asked questions that will test a wider understanding of your research and a general knowledge of Computer Security and Ethical Hacking as well as questions relating specifically to the material presented in your talk and assignment report.
Notes: 1. You are expected to use the Coventry University APA style for referencing. For support and advice on this students can contact Centre for Academic Writing (CAW): 2. Please notify your registry course support team and module leader for disability support. 3. Any student requiring an extension or deferral should follow the university process as outlined hers.
2. Exploitation (describing in detail the steps you have taken, tools you used) 3. Post-exploitation 4. Recommendations (how to make the target machines secure – this should address all vulnerabilities which you have identified in your assessment, not just the ones you have exploited)
This document is for Coventry University students for their own use in completing their assessed work for this module and should not be passed to third parties or posted on any website. Any infringements of this rule should be reported to facultyregiegy.eect@coventry.ac.uk.
5. Conclusions (this should contain Assessment of your work and also describe some alternative approaches you could have taken)
You do not need to provide an Executive Summary. Sections 1-3 of report should contain appropriate screen-shots and sample sessions from your work and any references supporting your findings/decisions. As a guide, your report should be about 2000 words.
You are to prepare and formally deliver a verbal presentation of your findings and conclusions from your Penetration Test, to an audience of academics. The presentation should be up to 5 minutes after which there will be a question and answer session lasting for approximately 5 minutes. As part of the questions session, you may be asked questions that will test a wider understanding of your research and a general knowledge of Computer Security and Ethical Hacking as well as questions relating specifically to the material presented in your talk and assignment report.
Notes: 1. You are expected to use the Coventry University APA style for referencing. For support and advice on this students can contact Centre for Academic Writing (CAM. 2. Please notify your registry course support team and module leader for disability support. 3. Any student requiring an extension or deferral should follow the university process as outlined here. 4. The University cannot take responsibility for any coursework lost or corrupted on disks, laptops or personal computer. Students should therefore regularly back-up any work and are advised to save it on the University system. 5. If there are technical or performance issues that prevent students submitting coursework through the online coursework submission system on the day of a coursework deadline, an appropriate extension to the coursework submission deadline will be agreed. This extension will normally be 24 hours or the next working day if the deadline falls on a Friday or over the weekend period. This will be communicated via your Module Leader. 6. Assignments that are more than 10% over the word limit may result in a deduction of 10% of the mark i.e. a mark of 60% will lead to a reduction of 6% to 54%. The word limit includes quotations, but excludes the bibliography, reference list and tables. 7. You are encouraged to check the originality of your work by using the draft Turnitin links on Aula. 8. Collusion between students (where sections of your work are similar to the work submitted by other students in this or previous module cohorts) is taken extremely seriously and will be reported to the academic conduct panel. This applies to both courseworks and exam answers. 9. A marked difference between your writing style, knowledge and skill level demonstrated in class discussion, any test conditions and that demonstrated in a coursework assignment may result in you having to undertake a Viva Voce in order to prove the coursework assignment is entirely your own work. 10.If you make use of the services of a proof reader in your work you must keep your original version and make it available as a demonstration of your
This document is for Coventry University students for their own use in completing their assessed work for this module and should not be passed to third parties or posted on any website. Any infringements of this rule should be reported to facultyrectistmeececoyenuy.ac.uk.
written efforts. 11.You must not submit work for assessment that you have already submitted (partially or in full), either for your current course or for another qualification of this university, with the exception of resits, where for the coursework, you maybe asked to rework and improve a previous attempt. This requirement will be specifically detailed in your assignment brief or specific course or module information. Where earlier work by you is citable, i.e. it has already been published/submitted, you must reference it clearly. Identical pieces of work submitted concurrently may also be considered to be self-plagiarism.
Marking Ribric
Pass marks will be ayulg a vulnerability and exploiting it. Report describing the above work will some analysis and recommendations but
====
The assignment you are referring to is for the module 7024CEM Ethical Hacking at Coventry University. The objective of the assignment is to perform a professional penetration testing examination on a number of virtual machines that represent a small office of a small and medium-sized enterprise (SME). The assignment requires you to write a report about your findings and recommendations for improving the security of the system. The report should have the following sections: Reconnaissance and target analysis, Exploitation, Post-Exploitation, Recommendations, and Conclusions. The report should include appropriate screenshots and sample sessions from your work, as well as references supporting your findings and decisions.

In addition to writing the report, you are also required to prepare and deliver a verbal presentation of your findings and conclusions from the penetration test. The presentation should be up to 5 minutes in length, followed by a question and answer session lasting approximately 5 minutes. Questions may be asked to test your wider understanding of computer security and ethical hacking, as well as specific questions relating to the material presented in your talk and report.

It is important to note that the report should be about 2000 words and should be written using the Coventry University APA style for referencing. Additionally, if you require disability support, you should notify the registry course support team and module leader. If you need an extension or deferral, you should follow the university process outlined in the instructions. Finally, the university cannot take responsibility for any coursework lost or corrupted on disks, laptops or personal computers, so students should regularly back-up their work and save it on the university system.

Published by
Dissertations
View all posts