Chat with us, powered by LiveChat WHAT CAN AN ATTACKER DO THROUGH EXPLOITING THIS VULNERABILITY? | Writedemy

WHAT CAN AN ATTACKER DO THROUGH EXPLOITING THIS VULNERABILITY?

WHAT CAN AN ATTACKER DO THROUGH EXPLOITING THIS VULNERABILITY?

This solution for this assessment cannot be directly found using a ‘Google’ search. You must understand this is a challenge and need to apply your knowledge and problem solving skills to a series of cyber security concepts. Also make sure you don’t share your progress or solutions with others.

A guide has been provided as part of the resources for this assessment. It is important to understand that the assessment has been designed for everyone to pass. To achieve a higher grade is going to require a concerted effort by you.

The learning objectives of this assessment task are to:

ULO1 Describe approaches to computer security including access control, identity verification and authentication in order to minimize the cyber attacks on a system.

ULO4 Apply the appropriate use of tools to facilitate network security to prevent various types of computer and network attacks, and malicious software that exists.

Cybersecurity Scenario

Welcome to Deakin Wargames, an interactive assessment of your knowledge and understanding of vulnerabilities relating to computer security, internet security and privacy.

This challenge requires you to work through ten levels, each of which contains a vulnerability. In order to progress to the next level, you must exploit this vulnerability to obtain a password which will grant you access to the next level.

Marks are allocated based on your ability to progress through each level as well as your understanding of the vulnerability and the recommendations you make on how to fix the issue. That is, you are expected to fully understand how you completed each level; this will be assessed through the problem solving task report.

Problem solving task report

Each student is to submit a report of approximately 2000 words and exhibits following the rubric provided. The report MUST include descriptions and evidence of results of the steps performed in order to be eligible to be awarded maximum marks for each rubric criterion.

You will note that the weighting is higher for levels 0-3 to enable everyone to pass. The levels then get more complex enabling you to decide what grade you want to achieve.

You are required to identify vulnerabilities and perform associated attacks to ultimately gain access to level 10 of the website. There are 5 vulnerabilities listed below covered by the 10 levels.

The name of the vulnerability that corresponds to each level is provided for you!

Information Leakage
Directory Traversal
Weak Encryption
Cookie Manipulation
SQL Injection

The following table provides guidelines on the information to be included for each vulnerability.

There needs to be 1 table completed per level.

Vulnerability Name

Level No(s)

War Game Level

Affected resources:
Copy and Paste the URL here corresponding to the level.

Description of Vulnerability

Describe the weakness or flaw of the War game level.

Observation

This is the main section of your report; what you were able to ascertain/discover as a result of testing. You should recreate the steps taken to exploit the vulnerability in question.

Be sure to include a screenshot showing the level of the ‘War Game’ the vulnerability relates to. No more than 2 screenshots per vulnerability, and make sure to provide a description for the screenshots.

Focus on demonstrating your understanding of the vulnerability and importantly, your understanding of the exploit you used.

Screenshot

Level Credentials – here you list the credentials to be used to gain access to the ‘War Game’ level(s) relating to the vulnerability.
Level 0 Password:

Impact Analysis
What is the threat? What can an attacker do through exploiting this vulnerability? If nothing, could they use this as an entry point to pivot and perform further attacks?

Recommendation
What are your recommendation(s) to mitigate this issue?

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order