Ethical Hacking and Security

Scenario: You are employed as an ethical hacker for a major UK bank. Recently a computer system on the company network has been compromised. The head of cyber security has instructed you to investigate the compromised computer. A virtual machine (VM) image has been provided. You are required to write a two thousand (2000) word report as detailed in parts one, two and three. Include good academic references and citations in your report to support your analysis. Write a clear, concise and well-presented report.

Part one: Identify and exploit the vulnerabilities provided in the image.

: Provide detailed technical analysis of the protection techniques to help mitigate any two of the vulnerabilities identified from the image provided in part one.

How could you clear your tracks and maintain access to the image provided?

 

 

Sample Solution

find the cost of your paper