
I need to help me on coursework in linuxzoo please
- or -
Post a project like this$$
- Posted:
- Proposals: 0
- Remote
- #870077
- Expired
Description
Experience Level: Intermediate
I have to write a report consisting of ANY ONE topic the list of topics below.
Topics:
1. Using the Kali setup, build an apache based site with files protected by basic authentication. Use a number of different username and passwords, where the passwords offer a range of complexities. Use this setup to investigate techniques for brute force authentication attacks such as password cracking. Include research into current techniques, as well as selecting a range of tools. Repeat the exercise for usernames and passwords in SSH in kali. In both cases, include an analysis of the tool performance, including run time and network load. Reflect on the results, and draw appropriate conclusions.
2. Construct an Apache configuration in Kali which in its nature highlights a minimum of four key aspects of weakness. Demonstrate the detection of these weaknesses using suitable tools and/or manual methods. Demonstrate how these could be mitigated, and confirm their mitigation by rerunning the detection methods. Reflect on the results, discuss, and draw appropriate conclusions. Document all of this task in an essay.
3. Undertake a small literature-based review, focusing in on a specific area of Web Application Testing, such as Database attacks, attacking users via XSS, or Authentication attacks (a good list is provided by OWASP). Provide background on the subject area and the technologies involved, the problems with the techniques and technologies, and the methods for performing penetration testing for this area. Use this information to assist in performing and documenting a Web Application penetration test on one of the web applications we have not investigated in Metasploitable (i.e. target 1 from LinuxZoo labs), restricted only to the specific area you researched, using the techniques and tools from your review. A basic methodology/testing procedure design should be included, followed by the details and findings of the testing. Produce a reflective discussion of your findings,
including how this might impact the web application owner, and any possible countermeasures. Include a brief conclusions section summarizing your findings and highlighting any key points.
4. Create a basic methodology/testing procedure design based around selected services running on the Metasploitable target host (target 1 from LinuxZoo labs). Perform and document a penetration test on these services, using the results from the techniques and tools from the testing procedure you created.
Produce a reflective discussion around your findings, including reflection on possible impact and risk to the host owner, and any possible countermeasures.
Create an associated executive summary report summarizing your important findings.
Topics:
1. Using the Kali setup, build an apache based site with files protected by basic authentication. Use a number of different username and passwords, where the passwords offer a range of complexities. Use this setup to investigate techniques for brute force authentication attacks such as password cracking. Include research into current techniques, as well as selecting a range of tools. Repeat the exercise for usernames and passwords in SSH in kali. In both cases, include an analysis of the tool performance, including run time and network load. Reflect on the results, and draw appropriate conclusions.
2. Construct an Apache configuration in Kali which in its nature highlights a minimum of four key aspects of weakness. Demonstrate the detection of these weaknesses using suitable tools and/or manual methods. Demonstrate how these could be mitigated, and confirm their mitigation by rerunning the detection methods. Reflect on the results, discuss, and draw appropriate conclusions. Document all of this task in an essay.
3. Undertake a small literature-based review, focusing in on a specific area of Web Application Testing, such as Database attacks, attacking users via XSS, or Authentication attacks (a good list is provided by OWASP). Provide background on the subject area and the technologies involved, the problems with the techniques and technologies, and the methods for performing penetration testing for this area. Use this information to assist in performing and documenting a Web Application penetration test on one of the web applications we have not investigated in Metasploitable (i.e. target 1 from LinuxZoo labs), restricted only to the specific area you researched, using the techniques and tools from your review. A basic methodology/testing procedure design should be included, followed by the details and findings of the testing. Produce a reflective discussion of your findings,
including how this might impact the web application owner, and any possible countermeasures. Include a brief conclusions section summarizing your findings and highlighting any key points.
4. Create a basic methodology/testing procedure design based around selected services running on the Metasploitable target host (target 1 from LinuxZoo labs). Perform and document a penetration test on these services, using the results from the techniques and tools from the testing procedure you created.
Produce a reflective discussion around your findings, including reflection on possible impact and risk to the host owner, and any possible countermeasures.
Create an associated executive summary report summarizing your important findings.

Adam D.
0% (0)Projects Completed
-
Freelancers worked with
-
Projects awarded
0%
Last project
15 Oct 2025
United Kingdom
New Proposal
Login to your account and send a proposal now to get this project.
Log inClarification Board Ask a Question
-
There are no clarification messages.
We collect cookies to enable the proper functioning and security of our website, and to enhance your experience. By clicking on 'Accept All Cookies', you consent to the use of these cookies. You can change your 'Cookies Settings' at any time. For more information, please read ourCookie Policy
Cookie Settings
Accept All Cookies