Question:
Choose two hacking challenges from any CTF web site.
Selected attacks must be:
- Of appropriate difficulty and
- Cover topics relevant to what was covered during the lecture and workshop
- Require a significant amount of effort and time. I.e attacks that can be completed with a single command are not acceptable. If you are not sure about this step, ask your lecturer for some suggestions
Complete the hacking challenges.
In the presentation, you need to explain the following concepts:
- The vulnerability and exploit
- How the attack was performed – briefly
- The implications: what can happen if a hacker manages to perform a similar attack to a real website or network.
The post BIT354 Network Vulnerability And Penetration Testing appeared first on My Assignment Online.