Ethical Hacking CYB502 Assessment
- Subject Code :
CYB502
- University :
Other Exam Question Bank is not sponsored or endorsed by this college or university.
- Country :
United Kingdom
Module Leader: AHMED AL-ANI |
Level: 5 |
|
Module Name: Ethical Hacking and Intrusion Detection |
Module Code: 55-508815 |
|
Assignment Title: Ethical Hacking |
||
Individual |
Weighting: 50 |
Magnitude: 2000 words |
Submission date/time: 01/May/2025 |
Blackboard submission Y/N |
Format: e.g. Word |
Planned feedback date: |
Mode of feedback: |
In-module retrieval available: Yes/No |
Module Learning Outcomes
|
Who do I contact if I have a question?
Ask the tutor most closely related to the issue first. If you dont feel the matter is resolved, then ask the module leader, course leaders, and/or teaching staff Farid Yavari Dizjikan (F.Yavari-Dizjikan@shu.ac.uk) and (Ahmed Al-Ani (a.r.al-ani @shu.ac.uk). If you still dont feel its resolved, then ask the subject leader (Dr Shahrzad Zargari: s.zargari@shu.ac.uk). If its still not resolved, ask the Deputy Head of Computing (Mark Jacobi: m.jacobi@shu.ac.uk).
Assessment Brief
- With regards to 2 rooms on TryHackMe platform, you are required to demonstrate your ability to carry out advanced exploitation techniques by creating a penetration testing methodology. Specifically, you are required to perform and report on the following(Suggested word count 2000):
***We may request a presentation of your work if there are any concerns regarding the quality or execution of the assessment.***
- Design of a methodology
- Host enumeration and fingerprinting
- Service enumeration and fingerprinting
- Vulnrebility scanning
- Vulnrebility exploitation
Please consider the links below for 2 machines that need to be completed for this assessment:
- Room 1:
https://tryhackme.com/jr/shuroom1
- Room 2:
https://tryhackme.com/jr/shuroom2
Marking Criteria |
Comment |
Weight |
Methodology Design |
This section focuses on
Firstly, a clear methodology should be presented, with sufficient detail so that a technical reader can understand the approach taken and what each stage. attempts to do. This can include but is not limited to:
|
10% |
Methodology Effectiveness & Efficiency |
This section focuses on
The report should then reflect you executing each step of the methodology. It should show each stage being executed efficiently with the least number of commands used, each command should run with the optimal options. The way the tools/commands are used should simulate attack from a malicious hacker. The output of the commands should also be show clearly and the output should be in its most efficient form. Or with a filter (i.e grep) used to extract the most important/key pieces of information Overall - You should show the execution of each step of the Ethical Hacking Methodology you present. Marks are awarded for how effective and efficient you are. |
10% |
Specific Results |
This section focuses on each machine.
|
70% |
Report Summary |
A technical and management summary are both presented which are tailored for each audience and highlight the key findings and approach |
10% |