Professional Documents
Culture Documents
https://www.bolton.ac.uk/assets/Uploads/Assessment-Regulations-
for-Undergraduate-Programmes-2020-21.pdf
Requests for extensions for periods longer than 5 days must be made using the
Mitigating Circumstances procedures. Please see your Programme Handbook
for further details.
DELIVERABLES
Section A)
Scanning is a set of procedures for identifying live hosts, ports, and services,
discovering Operating system and architecture of the target system, Identifying
vulnerabilities and threats in the network. Network scanning is used to create a
profile of the target organisation.
1) Use nmap, zenmap, netscan, masscan. Scapy and hping3 tools from
Kali Linux to scan Metasploit Virtual machine,
Critically analyse the results to show the open ports and the services
running on different ports and highlight on the advanced features in
nmap.
2- Use Snort as IDS to detect ICMP, nmap , hping3, create your own rules
to alert about any tcp connection from any external source to our ssh port.
Section C)
2. Assuming that a forensic team follows the standard steps for preserving
evidence integrity and keeping an unbroken chain of custody, what did
they do to convince the court, and why they have done so?
Section D)
1- Critically compare the MSF and Armitage. Support your answer with
examples.
2- Give an example of using MSF to exploit a vulnerability in a remote
system support your case with screenshots, and try to show your ability in
solving different technical issues.
Module Learning Outcomes
Breakdown of marks
a) 20%
b) 30%
c) 20%
d) 30%
The significance of this work = 50% of the total marks assigned to this unit.
Learning Resources
Cambridge: Syngress
Kanellis, P. ed., 2006. Digital crime and forensic science in cyberspace. IGI
Global.
Stallings, W., Brown, L., Bauer, M.D. and Bhattacharjee, A.K., 2012.
Computer security: principles and practice (pp. 978-0). Upper Saddle River (NJ:
Pearson Education.
Marty, R., 2009. Applied security visualisation (p. 552). Upper Saddle River:
Addison-Wesley.
Require the use of at least 17 academic research resources; this includes recent
scholarly research and recently published scientific books, to avoid plagiarism,
any external material used in your work must be appropriately referenced and
cited. Please see the module guide for more information.
Academic Misconduct
See module guide