Description
Ethical Hacking ASSIGNMENT
Task 1: (40 Marks)
With reference to at least two published research papers, answer the following questions:
Analyze any two well-known security attacks that can target web applications. (10 marks)
Recommend any two countermeasures for enhancing the security of web applications. (10 marks)
Analyze any two well-known security attacks that can target mobile applications. (10 marks)
Recommend any two countermeasures for enhancing the security of mobile applications. (10 marks)
Task 2: (60 Marks)
Google Gruyere is a deliberately vulnerable web application created by Google for the purpose of teaching and learning about web security vulnerabilities. It’s designed to simulate a simple web application with intentionally built-in security flaws, allowing developers, security professionals, and enthusiasts to practice identifying and exploiting common web security issues in a controlled environment.
In this task, you are requested to answer the following questions in details with a screen shout of each: (20 Marks)
Apply three different website footprinting tools and analyze the results. (10 Marks)
Apply three different scanning tools and analyze the results. (10 Marks)
Ready carefully what is in the code lab of the Gruyere web application, the warning and hints and apply the following techniques: (20 Marks)
For each of the following attacks, suggest appropriate countermeasures: (20 Marks)
Cross-Site Scripting (XSS)
Cross-Site Request Forgery (XSRF)
Path Traversal
Denial of Service
Cross-Site Scripting (XSS)
Cross-Site Request Forgery (XSRF)
Path Traversal
Denial of Service
Instructions:
Deadline of submission: 23/12/2023
Formative feedback on the complete assignment draft will be provided after submitting it at least 10 days.
All resources should be cited using APA style. The final assignment must have a Title page, Table of Contents, References/ bibliography using APA Style and page numbers.
The work will be uploaded in Turnitin to check the similarity which must be 0%.
The total number of words required for this assignment is 7000 words.
Module Learning Outcomes
The following LOs are achieved by the student by completing the assignment successfully.
Evaluate a suitable methodology and tools for penetration testing of a system
Analyze and conduct an ethically-based system penetration test, using an appropriate methodology to explore weaknesses in a system
Generate a report about a penetration test of a system to a professional standard, recommending and specifying suitable countermeasures
Unformatted Attachment Preview
Ethical Hacking ASSIGNMENT
Task 1: (40 Marks)
With reference to at least two published research papers, answer the following questions:
1. Analyze any two well-known security attacks that can target web applications. (10 marks)
2. Recommend any two countermeasures for enhancing the security of web applications. (10
marks)
3. Analyze any two well-known security attacks that can target mobile applications. (10 marks)
4. Recommend any two countermeasures for enhancing the security of mobile applications. (10
marks)
Task 2: (60 Marks)
Google Gruyere is a deliberately vulnerable web application created by Google for the purpose of
teaching and learning about web security vulnerabilities. It’s designed to simulate a simple web
application with intentionally built-in security flaws, allowing developers, security professionals, and
enthusiasts to practice identifying and exploiting common web security issues in a controlled
environment.
In this task, you are requested to answer the following questions in details with screen shout of each:
(20 Marks)
1. Apply three different website footprinting tools and analyze the results. (10 Marks)
2. Apply three different scanning tools and analyze the results. (10 Marks)
3. Ready carefully what is in the code lab of Gruyere web application, the warning and hints and
apply the following techniques: (20 Marks)
A. Cross-Site Scripting (XSS)
B. Cross-Site Request Forgery (XSRF)
C. Path Traversal
D. Denial of Service
4. For each of the following attacks, suggest appropriate countermeasures: (20 Marks)
A. Cross-Site Scripting (XSS)
B. Cross-Site Request Forgery (XSRF)
C. Path Traversal
D. Denial of Service
Instructions:
•
•
•
•
•
Deadline of submission: 23/12/2023
Formative feedback on the complete assignment draft will be provided after submitting it at
least 10 days.
All resources should be cited using APA style. The final assignment must have a Title page, Table
of Contents, References/ bibliography using APA Style and page numbers.
The work will be uploaded in Turnitin to check the similarity which must be 0%.
The total number of words required for this assignment is 7000 words.
Module Learning Outcomes
The following LOs are achieved by the student by completing the assignment successfully.
1. Evaluate a suitable methodology and tools for penetration testing of a system
2. Analyze and conduct an ethically-based system penetration test, using an
appropriate methodology to explore weaknesses in a system
3. Generate a report about a penetration test of a system to a professional
standard, recommending and specifying suitable countermeasures
Purchase answer to see full
attachment