IT SECURITY

Copyright © 2015-2018 VIT, All Rights Reserved. 1

MITS 5004
IT SECURITY
Assignment-3

Copyright © 2015-2018, Victorian Institute of Technology.
The contents contained in this document may not be reproduced in any form or by any means, without the written permission of VIT, other
than for the purpose for which it has been supplied. VIT and its logo are trademarks of Victorian Institute of Technology.

MITS 5004 Assignment 3
Copyright © 2015-2018 VIT, All Rights Reserved. 2
Assignment 3
Research and Presentation on security vulnerability
tools using Kali Linux
1. Group Formation
For this assignment, students need to form groups of 4 to 5 members under the supervision of
Lecturer/Tutor. Each group must be formed of 4 to 5 students. In case there is a small group
(such as with remaining two students), then the Lecturer/Tutor can rebalance the groups to
ensure that there are no “small” groups.
2. Topic Selection
Each group needs to select one of the following security vulnerability testing tools of Kali Linux
on a first come first served basis:
Hydra
Maltego
NMap
Zed Attack Proxy
SqlMap
Metasploit Framework
Burp Suite
If there are more groups than the number of available topics, then one topic can be selected by
more than one group. This should be arranged under the discretion of Lecturer/Tutor.
If a group wants to select a security vulnerability testing tool of Kali Linux that is not listed
above, the group needs to discuss this with the Lecturer/Tutor.
3. Deliverables
Members of each group need to learn the usage of the selected tool of Kali Linux. For this
students need to research, install, and use Kali Linux and the selected tool. After sufficient
study and hands on experience, each group needs to prepare and submit a report, and orally
present their understanding on the selected tool and Kali Linux as a whole (individual member
presentation). Formats of report and oral presentation are mentioned below.

MITS 5004 Assignment 3
Copyright © 2015-2018 VIT, All Rights Reserved. 3
3.1 Report
Each group needs to prepare a report (must be in PDF/DOC/DOCX) in the following format
(section headings):
1. Introduction of the tool
2. Features of the tool
3. Techniques used by the tool to exploit vulnerabilities of information systems
4. Experimental setup and evidence of usage of the tool (include screenshots of
vulnerability testing that you have performed)
5. Conclusions
6. References
The size of the report should be from
1500 to 1700 words. Report should include group number
and member information (member students’ name and students ID numbers).
3.2 Oral Presentation
Each person in a group needs to perform oral presentation of the selected tool for 5 minutes.
The presentation should be sufficiently detailed to enable audiences to be able to use the tool.
The oral presentation should (not limited to) include the following aspects:

Introduction to Kali Linux
Introduction to the selected tool of Kali Linux

Features of the tool
Details on the types of security vulnerability checks/attacks that can be carried
out with the tool

Each student needs to prepare a powerpoint/PDF presentation of 10-12 slides and show it
during the oral presentation. The powerpoint/PDF slides should contain
5-6 screenshots of the
experiements performed by the student
.
NOTE: In case it is infeasible for conducting oral presentation for all students, Lecturer/Tutor
can allow students to make a Video Presentation and upload in Moodle. In this case, the video
should clearly show the student presenting in person on the selected topic.
3.3 Moodle Submission
Students are required to submit the followings through Moodle:
1. Report (1500 to 1700 words): Must be in either PDF or DOC/DOCX format.
2. Video Presentation (5 mins presentation): Must be in mp4 or other similar format,
and must be less than 100 MB size.

MITS 5004 Assignment 3
Copyright © 2015-2018 VIT, All Rights Reserved. 4
4. Assignment Scoring Breakdown
See the scoring sheet below for this assignment and ensure that your presentation fulfills the
scoring criteria listed. All students in the same group will get the same mark for Report
submission, while Oral Presentation marks are assigned individually based on individual
performance. Your final mark will be the sum of the two marks.

Feature Score Description
Report
Introduction
of the tool
10 Comprehensive introduction
Features of
the tool
15 Full list of features
Techniques
used
15 Techniques used by the tool to exploit vulnerabilities of
information systems
Experimental
setup
15 Experimental setup and evidence of usage of the tool. Include
screenshots of vulnerability testing performed by the students
Conclusions 10 Conclusion should indicate full understanding of the tools
References 5 Appropriate reference list for the selected tool
Subtotal: 70 Subtotal for Report
Oral Presentation
Oral
Presentation
style
10 The presenter is confident, understandable, and well-rehearsed.
Students who read from scripts or do not understand the material
will lose marks.
Presentation
and contents
10 The following questions will be checked:
-How well has the topic been covered?
-Were significant aspects ignored?
-Were the descriptions accurate?
-Have all the stated requirements been fulfilled (for instance,
screenshots and justifications)?
Time 10 The presenter uses their time appropriately, neither going under
time nor over time.
Subtotal: 30 Subtotal for Oral Presentation
Total: 100