Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Assessment 2 Details and Submission Guidelines Purpose of the assessment (with ULO Mapping) ULO 2. Analyze IT systems and their security weaknesses ULO 3. Devise and execute cyber security attacks on...

1 answer below »

Assessment 2 Details and Submission Guidelines

page1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXX

Purpose of the assessment (with ULO Mapping)

ULO 2. Analyze IT systems and their security weaknesses
ULO 3. Devise and execute cyber security attacks on IT systems ULO 4. Critically analyze remediation steps and countermeasures to prevent damage to systems

Objectives of Assignment

  • Gain a understanding of web technologies

  • Learn modern techniques to map and scan the databases of

    web applications

  • Learn how to protect web application against active threats

Weight Total Marks Word limit Due Dates

page1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXX

Submission Guidelines

  • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.

  • The assignment must be in MS Word format, 1.5 spacing, 11- pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.

  • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Extension

  • If an extension of time to submit work is required, a Special Consideration Application must be submitted. You must submit this application within four working days of the assessment due date.

  • Further information is available at:Microsoft Word - QA20 Student Assessment XXXXXXXXXXdoc (filesusr.com)

page1image XXXXXXXXXXpage1image XXXXXXXXXX

Academic Misconduct

  • Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree.

  • Students should make themselves familiar with the full policy and procedure available at:Microsoft Word - Student Academic Integrity.docx (filesusr.com).

page1image XXXXXXXXXXpage1image XXXXXXXXXX
page2image XXXXXXXXXX

Assessment 2

Brute Force Attack On WordPress Web Site To Enumerate Users Names and Passwords

  1. Install Bitnami on Virtual Box. Download the copy of virtual machine for WordPress packaged by Bitnami from https://bitnami.com/stack/wordpress/virtual-machine

  2. Log in with user name as ‘bitnami’ and password ‘bitnami’.

  3. Change password

  4. Type‘ip addr’command to check IP address of newly launched web site

  5. Check the web site on your computer browser by typing ip address of web site.

page2image XXXXXXXXXXpage2image XXXXXXXXXX
page3image XXXXXXXXXX

6.

Type in browser ip address of web site followed by/wp-admin

page3image XXXXXXXXXX

7.

Find out user credentials by using command in Bitnami shell as shown below-

sudo cat /home/bitnami/bitnami_credentials

page3image XXXXXXXXXX

8.

Note down user name and password as shown in the figure and log in to wordpress admin panel

page4image XXXXXXXXXXpage4image XXXXXXXXXX

9. Create users on control panel by clicking on user tab on left hand side.

page4image XXXXXXXXXX

10. Addnew user called ‘admin’ with password as ‘password’.

page5image XXXXXXXXXXpage5image XXXXXXXXXXpage5image XXXXXXXXXX

11. Now open WPSCAN in Kali Linux and Type following command

wpscan --url http:// XXXXXXXXXXe u -U admin -P /root/rockyou.txt

Make sure that you have installed word dictionary on your kali linux from popular web sites andnamed it is ‘rockyou.txt’ and check the path name in the above command correctly. As well as checkthe IP address of your WordPress web site.

page6image XXXXXXXXXXpage6image XXXXXXXXXX

Output Window- Upload the output window screen on the weekly submissions for grading.

page6image XXXXXXXXXX
page7image XXXXXXXXXX

Marking Guide: Criteria

Installation of kali Linux

Testing of web Bitnami site

WP Scan Commands

Final Output

Description Marks

2 marks for description and 3 marks for screen shot 5

2 marks for description and 3 marks for screen shot 5

5 marks for description and commands used 5

5 marks for description and screen shot 5

Answered 3 days After Sep 28, 2022

Solution

Deepak answered on Oct 01 2022
70 Votes
Brute Force Attack On WordPress Web Site To Enumerate Users Names and Passwords
Installing Bitnami on Virtual Box.
To install Bitnami and kali Linux, we will use virtual images of these systems with the VirtualBox tool.
By clicking on these images, it will automatically get detected by VirtualBox and by clicking on import, we can see those images on VirtualBox and directly boot from there.
Here, we have added virtual machine images of bitnami, so booting it up from here.
This is a GRUB boot loader, so we have to select Debian GNU/Linux to boot up the bitnami WordPress virtual machine.
Here, we have to log in using the default username ‘bitnami’ and default password ‘bitnami’, which I have updated to a new password.
So, we can see the terminal for bitnami WordPress, after login in using the co
ect input of username and password.
Now, we can use the command ‘ip addr’ to get the IP for the hosted website. This is because this...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here