Ethical Hacking And Defense

Ethical Hacking Defense | Commencement Of Testing

PG/UG CSI3208 / CSI5208 – Ethical Hacking Defense

Assessment Notes:    

Ethical Hacking Defense | Commencement Of TestingUG (CSI3208) & PG (CSI5208) have different assessments

UG students must undertake the UG assignment

PG students must undertake the PG assignment

Kali Linux is available as a virtual machine on the Unit Resources section of Blackboard 


You are to infiltrate the provided system and attain root level privileges. Additionally there are five flags, these flags are represented as values and are awarded at each point of system compromise. Look for them in home directories, web pages etc.

You are to write a report outlining each test / attack run against the system and the result. You must follow a process, which should be defined prior to the commencement of testing. Your report should include the flags as well as any credentials you uncover as part of your hacking endeavours.

Note: You must compromise the system over the network, local, physical or other attacks requiring direct interaction with the target system are not valid for the purposes of the assignment.

Example flag: chahNaelia9zohlaseiPaich0QuoWoh8ohfaenaiQuaetaebushoakarai6lainohjongoneesoocahdei6guosiethae7uwuu5Kaid9eisah8EChoo4kaiGh2eit2mu

Postgraduate students: You must also write the following software and include it as part of your submission:

  • Basic TCP port scanner
  • Password cracker (of the type required to complete the case study)

Ethical Hacking Defense | Commencement Of Testing

Submission Requirements

You must include the following in your submission:

  • Your report containing:
    • Cover Page
    • Table of Contents
    • Executive Summary
    • Defined Methodology
    • Testing Log (should allow repeatability)
    • Results & Recommendations
  • Postgraduate Students:
    • Your source code for tools used
    • Compilation and usage instructions 

Marking Guides 

CSI3208 (Undergrad)
Executive Summary5
Defined Methodology15
Testing Log5
Results & Recommendations15

  Ethical Hacking Defense

CSI5208 (Postgrad)
Executive Summary5
Defined Methodology10
Testing Log5
Results & Recommendations15
Source/Instructions: PortScanner2
Source/Instructions: Password Cracker3


Your work must comply with ECU referencing guidelines and plagiarism policy

David Marks

Dear sir/Ma'am

Our dedication and hard work towards developing quality content has made us competent to provide excellent services to the clients as per their needs. We ensure plagiarism free writing obeying academic integrity and honesty making us a dedicated team towards developing original content helping students to ensure high grades. Our services are hassle free, timely yet at an affordable rate driving clients to avail it for a longer period of time making them loyal and satisfied towards us.

Services we offer:
Essay writing
Report writing
Assignment writing
Reflective writing
Proposal writing
Dissertation writing
Thesis writing
CDR writing
Annotated bibliography
PowerPoint presentation
Article/book review
Why us?
Plagiarism free original content
On-time services maintaining deadlines
Experienced writers
Plagiarism and Grammarly report
Dedicate Team Leaders and Quality Checkers
Subjects we cover:
Marketing management
Human resource management
Environmental science
Business studies
Political science
Journalism and Masscommunication

Declaration: Working with us will give you the opportunity to avail divergent range of academic services at affordable rates in assistance with the dedicated team having members from different disciplines holding high degrees in their respective domains. We are experienced in developing B-plan, writing dissertations and theses having employed highly qualified and experienced writers.

You can reach us at-
Oz Paper Help
1 Step 1