SlideShare a Scribd company logo
University Cyber Attack. Course-end Project 1
DESCRIPTION
You are a cyber security officer and member of the Incident Response Team. During the summer
vacation, one of the teaching staff members, Samantha, reports to the Dean about abusive and
threatening messages received over an email. Dean collects the following details from her:
Complete Name: Antha R. Coll. Personal Email ID, Official Email ID. Antha also reported that
during the term examination, she obstructed one of the students, Tony Lee, due to unfair means
during examination. As an investigator, your task is to identify the following:
Task 1: Obtain a scanning report of the entire network and identify how many terminals are
connected with the Windows operating system and the Linux-based systems. Note: Learners can
use any platform like Kali Linux.
Task 2: Identify CVE score of the victims vulnerability. Note: Learners can use any open-source
data sets for vulnerability like NVD (National Vulnerability Database).
Task 3: Identify whether the victims terminal is affected with MiMT attack or not and submit the
incident report for the same. Note: Learners can orchestrate any attacks like Denial-of-service
attack and create reports based on it.
Task 4: Use email forensics analysis and identify the senders IP address Note: Learners can
create a dummy email ID, perform this task, or send an email to anyone. They can identify the
sender's IP address.
Task5: Submit the complete incidence report

More Related Content

Similar to University Cyber Attack Courseend Project 1 DESCRIPTION Yo.pdf

An Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docxAn Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docx
nettletondevon
 
An Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docxAn Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docx
galerussel59292
 
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
IJNSA Journal
 
Mod2 wfbs new starter
Mod2 wfbs new starterMod2 wfbs new starter
Mod2 wfbs new starter
Ian Thiele
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
UltraUploader
 

Similar to University Cyber Attack Courseend Project 1 DESCRIPTION Yo.pdf (20)

Open port vulnerability
Open port vulnerabilityOpen port vulnerability
Open port vulnerability
 
An Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docxAn Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docx
 
An Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docxAn Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docx
 
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Mod2 wfbs new starter
Mod2 wfbs new starterMod2 wfbs new starter
Mod2 wfbs new starter
 
RIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdfRIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdf
 
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
A Study Of Open Ports As Security Vulnerabilities In Common User ComputersA Study Of Open Ports As Security Vulnerabilities In Common User Computers
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
 
Reproduced lesson plan in GIT 10.docx.pdf
Reproduced lesson plan in GIT 10.docx.pdfReproduced lesson plan in GIT 10.docx.pdf
Reproduced lesson plan in GIT 10.docx.pdf
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
Ch19
Ch19Ch19
Ch19
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
 
A Literature Review On Sniffing Attacks In Computer Network
A Literature Review On Sniffing Attacks In Computer NetworkA Literature Review On Sniffing Attacks In Computer Network
A Literature Review On Sniffing Attacks In Computer Network
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_gg
 
Adversarial Attacks and Defenses in Malware Classification: A Survey
Adversarial Attacks and Defenses in Malware Classification: A SurveyAdversarial Attacks and Defenses in Malware Classification: A Survey
Adversarial Attacks and Defenses in Malware Classification: A Survey
 
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
 
Cyber Incident Response Proposed Strategies
Cyber Incident Response Proposed StrategiesCyber Incident Response Proposed Strategies
Cyber Incident Response Proposed Strategies
 
185
185185
185
 

More from AAYAMINDIA

A Mientras est de guardia en el OPD de emergencia una mad.pdf
A Mientras est de guardia en el OPD de emergencia una mad.pdfA Mientras est de guardia en el OPD de emergencia una mad.pdf
A Mientras est de guardia en el OPD de emergencia una mad.pdf
AAYAMINDIA
 
Dyson Resolviendo los problemas de los clientes de maneras .pdf
Dyson Resolviendo los problemas de los clientes de maneras .pdfDyson Resolviendo los problemas de los clientes de maneras .pdf
Dyson Resolviendo los problemas de los clientes de maneras .pdf
AAYAMINDIA
 
Cul de los siguientes NO es cierto sobre la violencia arma.pdf
Cul de los siguientes NO es cierto sobre la violencia arma.pdfCul de los siguientes NO es cierto sobre la violencia arma.pdf
Cul de los siguientes NO es cierto sobre la violencia arma.pdf
AAYAMINDIA
 
4 Abra los datos de tornados y concntrese solo en la canti.pdf
4  Abra los datos de tornados y concntrese solo en la canti.pdf4  Abra los datos de tornados y concntrese solo en la canti.pdf
4 Abra los datos de tornados y concntrese solo en la canti.pdf
AAYAMINDIA
 
Utilice el caso Encontrar el camino hacia la excelencia ope.pdf
Utilice el caso Encontrar el camino hacia la excelencia ope.pdfUtilice el caso Encontrar el camino hacia la excelencia ope.pdf
Utilice el caso Encontrar el camino hacia la excelencia ope.pdf
AAYAMINDIA
 

More from AAYAMINDIA (20)

Add a new instruction wai where am I which puts the in.pdf
Add a new instruction wai where am I which puts the in.pdfAdd a new instruction wai where am I which puts the in.pdf
Add a new instruction wai where am I which puts the in.pdf
 
A What is a stakeholder analysis and why is it important to.pdf
A What is a stakeholder analysis and why is it important to.pdfA What is a stakeholder analysis and why is it important to.pdf
A What is a stakeholder analysis and why is it important to.pdf
 
Airline C accounts for the acquisition of its planes as capi.pdf
Airline C accounts for the acquisition of its planes as capi.pdfAirline C accounts for the acquisition of its planes as capi.pdf
Airline C accounts for the acquisition of its planes as capi.pdf
 
Case Synopsis Chabot Wallpaper Chabot is a privately owned .pdf
Case Synopsis Chabot Wallpaper Chabot is a privately owned .pdfCase Synopsis Chabot Wallpaper Chabot is a privately owned .pdf
Case Synopsis Chabot Wallpaper Chabot is a privately owned .pdf
 
A Mientras est de guardia en el OPD de emergencia una mad.pdf
A Mientras est de guardia en el OPD de emergencia una mad.pdfA Mientras est de guardia en el OPD de emergencia una mad.pdf
A Mientras est de guardia en el OPD de emergencia una mad.pdf
 
Dyson Resolviendo los problemas de los clientes de maneras .pdf
Dyson Resolviendo los problemas de los clientes de maneras .pdfDyson Resolviendo los problemas de los clientes de maneras .pdf
Dyson Resolviendo los problemas de los clientes de maneras .pdf
 
Before their rugby match with New Zealand in 1995 the South.pdf
Before their rugby match with New Zealand in 1995 the South.pdfBefore their rugby match with New Zealand in 1995 the South.pdf
Before their rugby match with New Zealand in 1995 the South.pdf
 
2 Suppose we are given a set L of n line segments in the pl.pdf
2 Suppose we are given a set L of n line segments in the pl.pdf2 Suppose we are given a set L of n line segments in the pl.pdf
2 Suppose we are given a set L of n line segments in the pl.pdf
 
A diferencia del spam el ransomware agraba todo lo que s.pdf
A diferencia del spam el ransomware  agraba todo lo que s.pdfA diferencia del spam el ransomware  agraba todo lo que s.pdf
A diferencia del spam el ransomware agraba todo lo que s.pdf
 
10 International football is such a sorrow to me Its so u.pdf
10 International football is such a sorrow to me Its so u.pdf10 International football is such a sorrow to me Its so u.pdf
10 International football is such a sorrow to me Its so u.pdf
 
Canliss Mining Company borrowed money from a local bank The.pdf
Canliss Mining Company borrowed money from a local bank The.pdfCanliss Mining Company borrowed money from a local bank The.pdf
Canliss Mining Company borrowed money from a local bank The.pdf
 
Cul de los siguientes NO es cierto sobre la violencia arma.pdf
Cul de los siguientes NO es cierto sobre la violencia arma.pdfCul de los siguientes NO es cierto sobre la violencia arma.pdf
Cul de los siguientes NO es cierto sobre la violencia arma.pdf
 
7 A player tosses three fair coins She wins 7 if 3 heads .pdf
7 A player tosses three fair coins She wins 7 if 3 heads .pdf7 A player tosses three fair coins She wins 7 if 3 heads .pdf
7 A player tosses three fair coins She wins 7 if 3 heads .pdf
 
ABC Inc yl boyunca FIFO maliyet ak ve periyodik envanter yn.pdf
ABC Inc yl boyunca FIFO maliyet ak ve periyodik envanter yn.pdfABC Inc yl boyunca FIFO maliyet ak ve periyodik envanter yn.pdf
ABC Inc yl boyunca FIFO maliyet ak ve periyodik envanter yn.pdf
 
A poll of 1103 Americans showed that 473 of the respondent.pdf
A poll of 1103 Americans showed that 473 of the respondent.pdfA poll of 1103 Americans showed that 473 of the respondent.pdf
A poll of 1103 Americans showed that 473 of the respondent.pdf
 
Ayn sonu geldi ve Marina 900lk maa gn kredisini demek i.pdf
Ayn sonu geldi ve Marina 900lk maa gn kredisini demek i.pdfAyn sonu geldi ve Marina 900lk maa gn kredisini demek i.pdf
Ayn sonu geldi ve Marina 900lk maa gn kredisini demek i.pdf
 
4 Why does Dr Dinora Chinchilla work 14hours a day caring.pdf
4 Why does Dr Dinora Chinchilla work 14hours a day caring.pdf4 Why does Dr Dinora Chinchilla work 14hours a day caring.pdf
4 Why does Dr Dinora Chinchilla work 14hours a day caring.pdf
 
4 Abra los datos de tornados y concntrese solo en la canti.pdf
4  Abra los datos de tornados y concntrese solo en la canti.pdf4  Abra los datos de tornados y concntrese solo en la canti.pdf
4 Abra los datos de tornados y concntrese solo en la canti.pdf
 
Which of the following is consistent with Leviathan theory .pdf
Which of the following is consistent with Leviathan theory .pdfWhich of the following is consistent with Leviathan theory .pdf
Which of the following is consistent with Leviathan theory .pdf
 
Utilice el caso Encontrar el camino hacia la excelencia ope.pdf
Utilice el caso Encontrar el camino hacia la excelencia ope.pdfUtilice el caso Encontrar el camino hacia la excelencia ope.pdf
Utilice el caso Encontrar el camino hacia la excelencia ope.pdf
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
Avinash Rai
 

Recently uploaded (20)

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
Forest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDFForest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDF
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 

University Cyber Attack Courseend Project 1 DESCRIPTION Yo.pdf

  • 1. University Cyber Attack. Course-end Project 1 DESCRIPTION You are a cyber security officer and member of the Incident Response Team. During the summer vacation, one of the teaching staff members, Samantha, reports to the Dean about abusive and threatening messages received over an email. Dean collects the following details from her: Complete Name: Antha R. Coll. Personal Email ID, Official Email ID. Antha also reported that during the term examination, she obstructed one of the students, Tony Lee, due to unfair means during examination. As an investigator, your task is to identify the following: Task 1: Obtain a scanning report of the entire network and identify how many terminals are connected with the Windows operating system and the Linux-based systems. Note: Learners can use any platform like Kali Linux. Task 2: Identify CVE score of the victims vulnerability. Note: Learners can use any open-source data sets for vulnerability like NVD (National Vulnerability Database). Task 3: Identify whether the victims terminal is affected with MiMT attack or not and submit the incident report for the same. Note: Learners can orchestrate any attacks like Denial-of-service attack and create reports based on it. Task 4: Use email forensics analysis and identify the senders IP address Note: Learners can create a dummy email ID, perform this task, or send an email to anyone. They can identify the sender's IP address. Task5: Submit the complete incidence report