Compare the penetration testing methodologies


Penetration Testing Assignment

Task 1: SOP for PenTesting

Task 1 is weighted at 50% of the overall portfolio mark. It is expected that this task of the portfolio will be the equivalent of 2000 words. You are expected to undertake research and critically compare the published penetration testing methodologies. You are expected to comment on the statutory and ethical considerations of a penetration tester. You are expected to design/develop a Standard Operating Procedure (SOP), including a decision-making tree, to describe how you will undertake a decision to pen test a target. In particular: intelligence gathering (target profiling), vulnerability identification and analysis, and target exploitation (including post exploitation). An SOP is defined as a set of step-by-step instructions compiled by an organisation to help workers carry out routine operations.

If you fail to provide references using the Harvard referencing style as per the University regulations, your work will be marked as superficial and is unlikely to obtain a passing grade.

Referencing style must be in Harvard Referencing style

Task 2: BASH LINUX SCRIPTING ONLY

- Information gathering script writing exercise

Create a script called my_new_whois.shthat utilises the provided whois_yahoo_mnt.txt

file to create a script that prompts the user to perform the following tasks:

1. Obtain all unique people in the file sorted in alphabetical order and place them in the specified file.

2. Obtain all inetnums in the file sorted in ascending numerical order and place them in the specified file.

3. Obtain all unique netnames sorted in alphabetical order and place them in the specified text file.

Your script should take as arguments the whois_yahoo_mnt.txt file and a user-specified

output file name to save the output of your script. An example of how your script shouldexecute from the shell is shown below:

A demo video of how a user interacts with the script is available on Canvas.

Your script should also

  • Provide an adequate level of input validation. For example, if the user enters '4' as an option (an invalid option) they should be prompted to enter a valid input.
  • Remove leading white space from any lines of text. You will need to research sed and/or awk in order to achieve this.
  • Append the date and time to the bottom of the file you created.

Bonus extension:

Rather than asking the user for the output file when running the script, dynamically create a file with the following file name structure:

option_YYYY_mm_dd_HH_MM_ss.txt

Can't Figure Out How To Score High? Get Penetration Testing Assignment Help By Apt Tutors At Viable Prices!

Tags: Penetration Testing Assignment Help, Penetration Testing Homework Help, Penetration Testing Coursework, Penetration Testing Solved Assignments 

Request for Solution File

Ask an Expert for Answer!!
Other Subject: Compare the penetration testing methodologies
Reference No:- TGS03053082

Expected delivery within 24 Hours