Element 1: For the practical part of this assignment, you will have to build Virtual Machines (VM), an exemplar scenario is clarified below but you can choose a different setup:
1. A Server
o You could use a Linux (e.g. CentOS, Ubuntu Server), or a Windows Server o Minimumconfigurationrequired
▪ Two services of your own choice (e.g. DHCP, FTP, SMTP, SNMP, Web etc)
2. A Client
o Could be either Windows (Visa, 7, 8, 10 etc) or Linux (Fedora, Ubuntu etc) o You could create multiple copies of the client’s VM if you require more
clients to demonstrate an attack 3. Attacker machine
Element 2: For this element, you are required to reference peer-reviewed papers.
In this first part of the assignment, you are required to plan and demonstrate a case study of offensive security:
Provide a summary of the configuration steps (e.g. for the server and client machines). Include screenshots to show that the environment is functional (e.g. to evident functionality at the client-side). Discuss the rationale behind service selection and configuration.
Demonstrate a minimum of 2 attacks in total against the services configured. Any further and complex attack steps will attract more marks. Log all the important and offensive events against your target including attacks detected, services’ logs nature, the origin of the attack and damage caused. Support your demonstration with screenshots.
Critically reflect on countermeasures and prevention mechanisms applied to mitigate against your attacks.
In the second part of the report, you are required to write a short position paper to critically analyse and reflect on recent state-of-the-art attacks and hacking techniques, followed by a discussion on possible countermeasures.
Your paper should consider the following guidance and contain the following subtitles as a minimum:
• Title page and Abstract
o The nature of the brief/commission and the topic should be briefly outlined and defined alongside details of how the paper is organised.
o Scope:howdidyouselecttheattacks/techniquesinthispaper?[login to view URL], wireless attacks, IoT attacks, DNS attacks etc
• Main body
o Critical discussion, reflection and analysis
o A brief summary of the key findings established from your research.
o A full list of references used within the paper should be provided. The Harvard Style of
referencing should be applied throughout the assignment.
Word count for Element 1 is 2000 words (+/- 10%) excluding references. Make sure you write the wordcount of Element 1 in your submission.
• Word count for Element 2 is 1500 words (+/- 10%) excluding references. Make sure you write the wordcount of Element 2 in your submission.