Computer Science with Cyber Security

Access the Cyber Security laboratory by following the instructions in the
coursework manual file and act as an ethical hacker for a company. Note that an
ethical hacker is an expert who attacks a security system on behalf of its owners,
seeking vulnerabilities that a malicious hacker could exploit.
You are challenged to identify flaws in a potential SQL database server by breaking
its crypto components and retrieve an encrypted credit card secret code of an ecommerce company. The crypto algorithm used to encrypt the credit card secret
code is the RSA, but with weak security parameters. More information on the
scenario and the detail steps you need to follow consult the Coursework Manual
file found in MOODLE.
Output/Report Structure
It is expected to document in detail your methodology and work plan to achieve
your goals. Your submitted report should have the following structure and include
the following information:

  1. Network discovery
    In this section identify the system (e.g., IP addresses of the devices that exist in the
    network, services running, OS software installed etc.) you will attack. Create a map
    of the network in a diagram form with your findings.
    [10 marks]
  2. Breaking the system (2000-3000 words)
    In this section discuss your attacking methodology. For example,
    a) Perform a dictionary attack in the admin password to gain access to the SSH
    server. Justify your answer. Clever solutions will earn full marks (e.g., in reallife environment your dictionary password/username files are very large.)
    [20 marks]
    b) Cryptanalyze (by hand only) the encrypted email to gain useful information.
    Provide details. Clever solutions will earn full marks (e.g., let’s assume you
    don’t have access to online resources.). Justify your answers.
    [20 marks]
find the cost of your paper

This question has been answered.

Get Answer