CMT118 : Malware Analysis and Vulnerability – Impact of Potential Security Attacks – Engineering Assignment Help

Assignment Task :

Assignment

There are two Tasks in this coursework: T1 is to analyse malware and it is worth 30 marks. T2 is to test a vulnerable Virtual Machine image and it is worth 70 marks.

For T1, you will be given access to two pieces of malware. You will analyse both and write a report with your conclusions. You should submit your report as a PDF or Word file. The report should be at most 1000 words. Anything beyond the first 1000 words will not be marked.

For T2, you will be given two VM images: one is a Kali Linux VM from which you will conduct your attacks against the other VM (Ubuntu Linux), which contains at least 7 vulnerabilities.

Your task is to follow a systematic process to find and exploit the vulnerabilities in the Ubuntu VM, propose fixes for the vulnerabilities that you find, and finally write a report with your findings and your recommendations. You should submit your report as a PDF or Word file. In total, the report should be at most 3000 words. Anything beyond the first 3000 words will not be marked.

Learning Outcomes Assessed

1. Perform static and dynamic malware analysis to explain the malware’s anatomy, its effects on a system and its spreading behaviour.

2. Identify, evaluate, and recommend, with justification, a selection of configurations and countermeasures to reduce the likelihood and impact of potential security

attacks.

3. Perform application penetration testing to identify system and network security vulnerabilities and exploit them.

4. Explain how to detect and react to network intrusions.

5. Explain how web browsers are used to exploit vulnerabilities and inject malicious code into web services (e.g. cross-site scripting

Detailed Instructions

Task 1: Malware Analysis 

As explained above, you will be given access to two pieces of malware. You must perform static and dynamic analysis on both to collect evidence and complete the following subtasks by referring to the evidence you collected:

1. List the malware’s significant imports and strings, and its host-based and networkbased indicators.  

2. Describe how the malware works.  

3. Describe the purpose the malware tries to achieve. 

Your report must clearly separate your responses to each of these sub-tasks.

Task 2: Vulnerability Assessment 

The VM images that you will be provided with are linked together in a network topology. You will log into the Kali Linux VM and you will conduct all your attacks from that VM. You should not modify the network topology. You should clearly follow a systematic pentesting methodology, you should clearly identify and describe each vulnerability you find and how you exploit it, and you should clearly propose how to fix it.

 

This Engineering Assignment has been solved by our Engineering Experts at TVAssignmentHelp. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.

Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

How to create Testimonial Carousel using Bootstrap5

Clients' Reviews about Our Services