Ethical Hacking and Security
Scenario: You are employed as an ethical hacker for a major UK bank. Recently a computer system on the company network has been compromised. The head of cyber security has instructed you to investigate the compromised computer. A virtual machine (VM) image has been provided. You are required to write a two thousand (2000) word report as detailed in parts one, two and three. Include good academic references and citations in your report to support your analysis. Write a clear, concise and well-presented report.
Part one: Identify and exploit the vulnerabilities provided in the image.
: Provide detailed technical analysis of the protection techniques to help mitigate any two of the vulnerabilities identified from the image provided in part one.