Assignment title: Information
.© 2015 Neil Eliot
[1]
Assignment
Authors: Neil Eliot (Newcastle)
Ronald K Shiflet (Singapore)
January 2017
EN0561
Principles of Ethical Hacking
Attack Analysis in Ethical Hacking
Assignment 1 of 1
Assessment Weighting 100% of Module
Submission Date:
Via TurnItIn on 20th April 2017© 2015 Neil Eliot
[2]
CONTENTS
INTRODUCTION..............................................................................................3
LEARNING OUTCOMES .................................................................................3
PLAGIARISM ...................................................................................................4
REQUIREMENTS.............................................................................................4
TASKS..............................................................................................................5
MARKING SCHEME ........................................................................................8
SUBMISSION DETAILS...................................................................................9© 2015 Neil Eliot
[3]
INTRODUCTION
This assignment consists of carrying out research into hacking tools and
systems/network protocols and developing a technical report in (IEEE format -Word
and Latex, templates provided).
The assignment is designed to enable the student to examine the effects specific
security tools have on computer systems. At the conclusion of their investigation,
students will produce a report on the protocol/application they have chosen to
examine and the tools they have used to attack/investigate that protocol/application
(including how any tools function), along with identifying any available
countermeasures that exist to increase the levels of security that can be
implemented.
The report component of this assignment is to be carried out as an individual piece of
work; the research component which leads up to the production of the report is to be
carried out in groups of four. Members of the group may share findings and test
results during the research phase but must not assist each other with the production
of their individual report.
Each group selects a topic area and works in that area together, only the report
component needs to be an individual piece of work.
LEARNING OUTCOMES
This assignment is designed to link into the following Learning Outcomes of the
Module
• Evaluate the principles of ethical hacking and appreciate where and in what
situations these principles should be applied.
• Appreciate the legal and ethical issues associated with ethical hacking and be
aware of the documentary and evidentiary standards expected in presenting
the results of ethical hacking activities.
• Analyse and evaluate the professional requirements of an ethical hacker and
critically discuss the challenges facing the ethical hacker
• Assess computer systems, information systems and networks to identify their
vulnerabilities and weaknesses so as to be able to penetrate those systems
or networks
• Evaluate the means by which systems or networks are penetrated and design
and test countermeasures to address those weaknesses and vulnerabilities.
• Appreciate how the core concepts, knowledge and practice of computer
security have developed through research.
This is achieved by developing a technical report based upon the practical use of
hacking/penetration testing tools and analysing the effects they have on a computer
system along with identifying and testing countermeasures to increase security.© 2015 Neil Eliot
[4]
PLAGIARISM
Please read appendix 1 on issues relation to plagiarism. Also please see
http://northumbria.ac.uk/sd/central/stud_serv/ssc/writing/plag/ for plagiarism advice
and information.
Academic Misconduct
Your work, for all parts of the assignment, must be your own and, where you have
used someone else’s words (quotations), they should be correctly quoted and
referenced in accordance to the IEEE format as provided for this assignment.
Cases of suspected academic misconduct (e.g. collusion or plagiarism) will be dealt
with in accordance to the Assessment Regulations for Northumbria Awards (ARNA).
Documents outlining assessment documentation for students is available from:
http://www.northumbria.ac.uk/sd/central/ar/qualitysupport/assess/assproc/assdocstud/
REQUIREMENTS
You are required to work in groups of four or at the discretion of the lecturer; smaller
groups may be allowed, in extreme circumstances an individual may be allowed to
work on their own.
Choose ONE member of your group to send an e-mail to:
[email protected].
The e-mail should have the Subject ‘EN0561 2017 T1 Group’ and contain a
complete list of the group’s members, giving the student number, name and e-mail
address of all group members.
Example:
To: [email protected]
Subject: EN0561 2017 T1 Group
Hello,
Our Group is:
123456 Yew Soh Fatt [email protected]
123457 River Smith [email protected]
This e-mail should be sent before the end of your seminar session in week 8 of
semester2 (6th March 2017). If you have not assigned yourself to a group by 17.00 on
the Friday of that week, you must send an email to [email protected]
subject ‘EN0561 2016 T1 No Group’. You will be allocated to a suitable group.
Ultimately, it is your responsibility to join a group.
As groups are confirmed they will be listed in the Blackboard Module.© 2015 Neil Eliot
[5]
TASKS
1. GROUP SELECTION
Firstly you must organise yourselves in to groups of four for the analysis and
research stages of the assignment.
2. SUBJECT SELECTION
Once you have a group you must identify an area of interest from the Kali Linux
distribution that you wish to research, this must be discussed with the module team
to ensure it is an appropriate area.
As a starting point the following are suitable areas of study.
• DDNS – An investigation of the Protocol reconnaissance techniques (e.g.
spoofing, hijacking, redirection etc.) and counter measures
• 802.11bg – An investigation of the Protocol reconnaissance techniques and
counter measures
• MITM Attacks through Cache Poisoning – An investigation of the cache
poisoning techniques and counter measures for at least 2 protocols (e.g.
ARP, DNS, etc.).
• Phishing – An investigation into Phishing and related social engineering
techniques and counter measures. Students should study exploitation via
various social engineering techniques.
• Apache Vulnerability Assessment – An investigation of the Application
configuration, reconnaissance techniques and counter measures.
• Joomla Vulnerability Assessment – An investigation of the Application
configuration, reconnaissance techniques and counter measures.
• DDOS (Distributed Denial of Service) Attacks – An investigation of the
abused Protocols and why they are vulnerable, flooding techniques used and
counter measures
NOTE: Due to the amount of coverage of SSH in the teaching environment SSH is not
an acceptable subject of your investigations.© 2015 Neil Eliot
[6]
3. RESEARCH
Once the subject area is agreed, you must research the Protocols, Applications and
Tool Sets and demonstrate within your report that you have gained a good
understanding of how and why they are implemented for general use, and how they
can be applied to company infrastructures and the internet.
You should also use the honeypot environment to allow a close analysis of how the
protocols function and demonstrate the effect they have on the network traffic or
application (essential part of your report).
You should also identify which part of the protocols are being attacked and highlight
this within the standards that are available (essential for the report).
Once a full understanding of the protocol and the attack tools is achieved, you should
investigate the countermeasures and hardening techniques that are available for the
protocols and techniques you have chosen and show how these techniques have
improved the security of the environment. This should include evidence gained from
the honeypot environment to illustrate how the counter measures have improved the
security.
4. GROUP REPORT
The report you develop must be in IEEE format. An indicative list of sections for the
report is :-.
• Title
• Abstract
• Introduction
• Protocol Scope
• Protocol Standards
• Toolset/Attack Software
• Toolset/Attack Effects
• Counter Measure Techniques
• Counter Measure Effects
• Conclusion
• References
• Appendix
If during any of the work involved you develop software it should be included in the
report as an appendix (Marks may be awarded if the code is referenced in the main
report as a part of that section).
FORMATIVE FEEDBACK
Formative feedback will be provided throughout the seminar workshops and also
during the Research and Analysis component of the module to assist in moving your
projects forward.© 2015 Neil Eliot
[7]
SUMMATIVE FEEDBACK
Summative feedback will be provided 3 weeks after the submission date as listed on
the front of the assignment.© 2015 Neil Eliot
[8]
MARKING SCHEME
This assignment consists of an individual report which constitutes 100% of the
marks for the module.
The marks will be awarded as show below :-
Deliverable – Individual Report Max Score
Title 0%
Abstract 5%
Introduction 5%
Protocol Scope 10%
Protocol Standards 15%
Toolset/Attack Software 15%
Toolset/Attack Effects 15%
Counter Measures Techniques 15%
Counter Measures Effects 10%
Conclusion 5%
References 5%
TOTAL 100%
If you develop any software you should include a code listing as an
appendix in the report, if referenced from the report it will be included in
the marking of that section.© 2015 Neil Eliot
[9]
SUBMISSION DETAILS
The report must be in PDF format and submitted via ‘TurnItIn’ in the
assignment area of the blackboard site by the date and time shown on
the front of this assignment.
All code listings must be included as text (not screen dumps) and must be
formatted using a monospaced font (e.g. Courier New) size 8 e.g.
int main(void)
{
time_t t;
char password[9];
#ifdef _WIN32
system("cls");
#else
system("clear");
#endif
/* Intializes random number generator */
srand((unsigned) time(&t));
header();
sprintf(password, "%i%i%i%i%i%i%i%i", rand() % 9, rand() % 9, rand() % 9, rand() %
9, rand() % 9, rand() % 9, rand() % 9, rand() % 9);
printf("|%s %s | ", REVERSE, password);
MDString(password);
printf(" %s|\n",ALL_NORMAL);
footer();
return 0;
}
NOTE: The report must be submitted to “TurnItIn” in the assessments
area, failure to submit and electronic copy will result in a mark of zero.
Paper submissions must also be made on the 2nd floor, as per usual.