Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Summative Assessment Group or Individual Project: 250 pts. Directions on Project: Your instructor will provide information about project topics, the scope of work, and submission requirements. Review...

1 answer below »

Summative Assessment Group or Individual Project: 250 pts.
Directions on Project:
Your instructor will provide information about project topics, the scope of work, and submission requirements. Review scoring ru
ic for the project to aid in the construction and organization of the project. Listed below are potential guidelines for you to follow:
Guidelines on Your Cybersecurity Bachelor Project
Following are the guidelines for a graduate project. Apart from these guidelines, your instructor may also suggest guidelines and instructions as required during the course of the graduate project.
Selecting a Topic
· Choose a project on a topic of your interest related to your subject of study. The idea for a project may come from your own curiosity, from your coursework, interactions with colleagues, faculty members, and general observation. The group project will decided between your colleagues and approved by your instructor. The project should include a working demo and technical documentation.
· Explore the idea; examine its significance and feasibility. Go through the existing projects on similar topics. Conduct a preliminary research on the idea. Review the relevant literature. Examine the gap areas in research and identify issues you want to address. The idea should be new or must add significant value to the existing projects.
· Prepare a rough outline of project proposal you would like to submit.
· Conduct further research on the topic. Make a detailed proposal. In the project proposal, you should:
a. Introduce the topic
. Explain your rationale for selecting the project
c. Describe the significance of the project
d. State the objective of the project and project outline
e. Describe the methodology to be adopted
f. State the timeline for the project completion
g. Include references
· Finalize the proposal with your instructor by week 10. Post your proposal to the discussion board related to the project here:Your Cybersecurity Team Project
Working on the Project
· On approval of the project, you should start working on your project. It is recommended you do this prior to the 11th week of the course but speak with your instructor to clarify dates. Limit your research to the approved proposal.
· Make sure your instructor approves questionnaires designed for any survey in relation to the project.
· You must use any data collected in course of the research, only for the approved project. You must not share collected information with other candidates.
· Make notes of key points during the course of research. It would save a lot of time in preparation of project report.
· Make sure all relevant journals, magazines, papers, and books are available in the college li
ary. Please check with the li
ary information desk for information on resources, cu
ently not available with the li
ary.
· The analysis is the most critical part of the project and forms basis for all findings.
Writing a Project Report
· Review the style guidelines for project report
· Select A4 size; page orientation should be portrait. Specify “1” margin on all sides.
· Number all pages consecutively. Start every chapter on a new page.
· Provide double spacing
· You should use Times New Roman Font- “12” for text and “10” for footnotes. Use a larger font size for section headings.
· Optional Report template: ISM 3321 Research Paper Template.docx
· Actions
·
· A Project guideline may contain:
    Content
    Section
    a. Title Page
    Preliminaries
    b. Table of Contents
    
    c. Abstract(Optional)
    
    d. Introduction and background
    Body of the report
    e. Problem statement
    
    f. Objectives of the project
    
    g. Technical walk through including screenshots
    
    h. Methodology adopted (optional)
    
    i. Results - project findings
    
    j. Recommendations
    
    k. Conclusion
    
    l. Bibliography
    References
    m. Appendix (Optional)
    
    n. List of figures and tables(optional)
    
    o. Index words (optional)
    

· Be clear and precise. Express your ideas in a logical way.
· If using an abstract it should reflect the essence of the project
· The introduction should provide the overview of the topic and highlight its significance
· Clearly, indicate the objectives of your project.
· If using several types of methods, describe all the methods used such as interviews, questionnaires in the methodology section. Optional.
· Ensure that literature review is in your own words. Analyze other person’s contribution to the topic. Identify the gaps in the literature. Emphasize on the likely contribution of your project to the existing literature on the topic.
· Describe your findings from the analysis in the results section. As this is the most critical part of the project, ensure that there are no e
ors in analysis. Make proper inferences from analysis and findings.
· The conclusion section should summarize your objectives, findings, and learning’s from the project. Provide useful supplementary information in the Appendix.
· Avoid plagiarism. The project report should reflect your understanding of the topic. The majority of the paper should be in your own words and reflect your own ideas.
· Give credit for all referenced work. Provide appropriate citation and references for all quotations.
· Ensure that papers referenced are relevant and not outdated.
· Your paper should be reader friendly. Use footnotes to explain difficult terms.
· Don’t use text from Wikipedia in footnotes
· All tables and figures must be suitably numbered and titled. Give appropriate credit.
· On completion, go through the entire project. Ensure there are no proofing e
ors and you have adhered to all guidelines related to the project.
Note: The final step to submit your assignment is to accept the "Submission Statement". You need to click the "Submit Assignment" button on the right side of the page. Then select the checkbox and continue button. Each member of the group should submit the final version of their project in pdf form.

Ru
ic
Research Paper (60)
Research Paper (60)
    Criteria
    Ratings
    Pts
    This criterion is linked to a Learning OutcomeIntroduction
        6 pts
Exceeds Standards
Strong introduction of topics key question(s), terms, Clearly delineates subtopics to be reviewed. Specific thesis statement
    3 pts
Meets Standards
Conveys topic and key question(s). Clearly delineates subtopics to be reviewed. General thesis statement
    2 pts
Needs Some Improvement to Meet Standards
Coveys topic, but not key question(s). Describes subtopics to be reviewed. General thesis statement.
    1 pts
Needs Substantial Improvement to Meet Standards
Does not adequately convey topic. Does not describe subtopics to be reviewed. Lacks adequate theses statement.
    6 pts
    This criterion is linked to a Learning OutcomeFocus and Sequencing
        18 pts
Exceeds Standards
All material clearly related to subtopic, main topic. Strong organization and integration of material within subtopics. Strong transitions linking subtopics, and main topic.
    9 pts
Meets Standards
All material clearly related to subtopic, main topic and logically organized within subtopics. Clear, varied transitions linking subtopics, and main topic.
    5 pts
Needs Some Improvement to Meet Standards
Most material clearly related to subtopic, main topic. Material may not be organized within subtopics. Attempts to provide variety of transitions.
    1 pts
Needs Substantial Improvement to Meet Standards
Little evidence material is logically organized into topic, subtopics or related to topic. Many transitions are unclear or unsubstantiated.
    18 pts
    This criterion is linked to a Learning OutcomeSupport, Citations, and References
        18 pts
Exceeds Standards
Strong peer-reviewed research based support for thesis, references and citations are thoroughly and clearly indicated after every quote or an authors statement or idea.
    9 pts
Meets Standards
Good research based support for thesis, references and citations are adequately and clearly indicated after most quotes or an authors statement or idea.
    5 pts
Needs Some Improvement to Meet Standards
Some research based support for thesis, references and citations are inconsistently indicated after a few quotes or an authors statement or idea.
    1 pts
Needs Substantial Improvement to Meet Standards
limited or no peer-reviewed research based support for thesis, references and citations are absent.
    18 pts
    This criterion is linked to a Learning OutcomeSpelling and Gramma
        6 pts
Exceeds Standards
Work has no misspellings or grammatical e
ors.
    3 pts
Meets Standards
Work has 1 or 2 misspellings or grammatical e
ors
    2 pts
Needs Some Improvement to Meet Standards
Work has several misspellings or grammatical e
ors
    1 pts
Needs Substantial Improvement to Meet Standards
Work has numerous misspellings or grammatical e
ors
    6 pts
    This criterion is linked to a Learning OutcomeConclusion
        6 pts
Exceeds Standards
Strong review of key conclusions and integration with thesis statement. Insightful and supported discussion of impact of the researched material.
    3 pts
Meets Standards
Good review of key conclusions and integration with thesis statement. Good discussion on impact of researched material.
    2 pts
Needs Some Improvement to Meet Standards
Review of key conclusions. Some integration with thesis statement. Discusses impact of researched material on topic.
    1 pts
Needs Substantial Improvement to Meet Standards
Does not summarize evidence with response to thesis statements. Does not discuss the impact of researched material.
    6 pts
    This criterion is linked to a Learning OutcomeCitations and References
        6 pts
Exceeds Standards
All references and citations are co
ectly written and present.
    3 pts
Meets Standards
One reference or citations missing or inco
ectly written.
    2 pts
Needs Some Improvement to Meet Standards
Two references or citations missing or inco
ectly written.
    1 pts
Needs Substantial Improvement to Meet Standards
Reference and citation e
ors detract significantly from paper.
    6 pts
     This criterion is linked to a Learning Outcome1. Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements.
Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements.
threshold: 3.0 pts
        5 pts
Exceeds Expectations
    3 pts
Meets Expectations
    0 pts
Does Not Meet Expectations
    --
     This criterion is linked to a Learning Outcome2. Analyze different phases of hacking and recommend the strategy to use ethical hacking for assessing security of various components of information system.
Analyze different phases of hacking and recommend the strategy to use ethical hacking for assessing security of various components of information system.
threshold: 3.0 pts
        5 pts
Exceeds Expectations
    3 pts
Meets Expectations
    0 pts
Does Not Meet Expectations
    --
     This criterion is linked to a Learning Outcome3. Compare and contrast different hacking techniques and analyze the legal implications of hacking.
Compare and contrast different hacking techniques and analyze the legal implications of hacking.
threshold: 3.0 pts
        5 pts
Exceeds Expectations
    3 pts
Meets Expectations
    0 pts
Does Not Meet Expectations
    --
     This criterion is linked to a Learning Outcome4. Examine different vulnerabilities, threats and attacks to information systems and recommend the countermeasures.
Examine different vulnerabilities, threats and attacks to information systems and recommend the countermeasures.
threshold: 3.0 pts
        5 pts
Exceeds Expectations
    3 pts
Meets Expectations
    0 pts
Does Not Meet Expectations
    --
     This criterion is linked to a Learning Outcome5. Analyze cryptography algorithms and encryption techniques, and design implementation strategies for securing information
Analyze cryptography algorithms
Answered 8 days After Apr 25, 2022

Solution

Naveen Kumar answered on Apr 28 2022
116 Votes
EXPLOIT SMB Remote Windows Kernel Pool Co
uptionMS17-010
ISM 3321 Research Pape
Running head: EXPLOIT THE Windows SYStem smbv1    1
13
EXPLOIT SMB REMOTE WINDOWS KERNEL POOL
ISM 3321 Research Pape
Nicole Dyess
Eastern Florida State College
Spring 2021 ISM 3321 Cybersecurity Fundamentals
Table of Contents
Abstract------------------------------------------------------------------------------------------------------- 2
Introduction -------------------------------------------------------------------------------------------------- 3
Problem Statement------------------------------------------------------------------------------------------- 3
Objectives of project----------------------------------------------------------------------------------------- 4
Technical walkthrough-------------------------------------------------------------------------------------- 4
Results-------------------------------------------------------------------------------------------------------- 12
Recommendations------------------------------------------------------------------------------------------- 13
Conclusions-------------------------------------------------------------------------------------------------- 13
Abstract
Internet is changed everything, it has
ought a revolution in way of communication and sharing the information compared to legacy ways. Now a day’s majority of the confidential and common information had been exchanging through the internet in a secure way. But based on the sum of weak spots or vulnerabilities on the windows hackers successfully exploiting and compromising the information. SMB also known as a Server Message Block, is a file sharing protocol that allows windows systems connected or communicating to the same network or domain to share files. SMB also give an access to network devices to share resources like printers and serial ports from other devices in the same subnet.
Introduction
SMB is the protocol, used for sharing the file and information in between the devices connected in a network. They are multiple versions of SMB is in the productions, in this assignment I’m going to exploit SMBv1 vulnerability.
Vulnerability in SMBv1:
· SMB v1 vulnerability could allow a remote attacker to take control of an affected device.
· Microsoft already been released a patch to point the SMB v1 vulnerability.
Still most of the users are using legacy windows 7 operating system with services pack 1, this is most effected pack with EternalBlue exploits the SMB vulnerability.
Problem Statement
Communication methods with the help of Internet:
The Internet has become embedded in every aspect of our day to day live, changing the way we interact with others and sharing the file or information. Attackers are taking the advantages of this opportunities.
Objectives
I’m going to demonstrate the windows exploit, MS17-010 known as Eternal Blue.
EternalBlue is the given name to a series of microsoft software vulnerabilities and the exploit created by the Nation security agencies as a cyberattack tool.
For this exploit what are the tools, scripts and technologies all are legitimate and legal.
Technical Walk-Through
Exploiting the windows operating system running with SMB v1.
Items used:
Exploited Tools:
Metasploit Framework v6.
NMAP Scanner.
Operating Systems:
Linux- Kali.
Microsoft Windows 7.
Microsoft Windows Server.
Applications:
Command promote.
Microsoft Edge.
Architectures:
X64
Exploit Methods:
Searching for open ports and vulnerabilities:
I’m starting with an NMAP deep scan while running the vulnerability script which tries to find common vulnerabilities of the services running on the windows server’s or ports.
Note: Please refer the attached NMAP_Scan_result file for more information.
mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using --system-dns or specify valid servers with --dns-servers
Initiating SYN Stealth Scan at 04:30
Scanning 10.0.0.11 [1001 ports]
Discovered open port 135/tcp on 10.0.0.11
Discovered open port 139/tcp on 10.0.0.11
Discovered open port 445/tcp on...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here