LD7010 - Assignment
LD7010 - Assignment
Page 1 of 8
Requirements
For the practical part of this assignment, you will have to build three Virtual Machines
(VM):
A Linux Server
You could use CentOS or Ubuntu Server
Minimum configuration required
DNS
An additional service of your own choice (e.g. DHCP, FTP, SMTP, SNMP etc)
A Client
Could be either Windows (Visa, 7, 8, 10 etc) or Linux (Fedora, Ubuntu etc)
You could create multiple copies of the client’s VM if you require more clients
to demonstrate an attack
Attacker machine
Kali Linux (the most recent version is highly recommended)
Assignment Tasks and Deliverables
The main submission is a single individual report consisting of two parts as follows:
Part A
In this first part of the assignment, you are required to:
Provide a summary of the configuration steps on the server and client. Include
screenshots to evident functionality at the client-side. Discuss the rationale
behind service selection and configuration. (10%)
Demonstrate a minimum of 2 attacks against each of the two services
configured. Any further and complex attacks will attract more marks. Log all the
important and offensive events against your target including attacks detected,
services’ logs nature, origin of the attack and damage caused. Support your
demonstration with screenshots. (35%)
Critically reflect on countermeasures and prevention mechanisms applied to
mitigate against your attacks. (15%)
Part B
In the second part of the report, you are required to write a short position paper to
critically analyse and reflect on recent state-of-the-art attacks and hacking
techniques, followed by a discussion on possible countermeasures. (weights 40%)
Your paper should consider the following guidance and contain the following
subtitles as a minimum:
Title page and Abstract
Introduction
The nature of the brief/commission and the topic should be briefly outlined
and defined alongside details of how the paper is organised.
Scope: how did you select the attacks/techniques in this paper? E.g. most
recent attacks, wireless attacks, VoIP attacks, DNS attacks etc
Main body
Critical discussion, reflection and analysis
Conclusions
A brief summary of the key findings established from your research.
Page 2 of 8
References.
A full list of references used within the paper should be provided. The Harvard
Style of referencing should be applied throughout the assignment.
This is an INDIVIDUAL assessment and should be entirely your own work. Where
you have used someone else’s words (quotations), they should be correctly quoted
and referenced in accordance to the Harvard System. Help regarding referencing
can be found at:
https://cragside.northumbria.ac.uk/Everyone/skillsplus/database_uploads/55389538.pdf?
Part A (60%)
Page 3 of 8
Configuration 10
Balanced summary of the configuration steps with screenshots to evident
functionality.
Clear rationale behind service selection and configuration
Attacks Demonstration 35
A minimum of 2 comprehensive attacks against each of the two services
configured.
A log of all the important and offensive events including attacks detected,
services’ logs nature, origin of the attack and damage caused.
Supported by screenshots
Countermeasures 15
Critical reflection on prevention mechanisms applied to mitigate against
attacks
Part B (40%)
Main body 20
Critical discussion, reflection and analysis
Clear evidence of excellent critical thinking and problem-
solving approach.
Excellent presentation in terms of communication and content.
Conclusion 5
A brief summary of the key findings established from your
research.
References 5
Marks deducted in case of poorly structured reports, layout, word count
(15 marks)
Total 100
Page 4 of 8
Grading Guidance
Page 5 of 8
1-39% Work is not acceptable and provides little evidence of the knowledge,
understanding and skills appropriate to level 7. Few of the learning
outcomes are met.
Inadequate in some of the following aspects or seriously inadequate in at
least one: use of relevant material; development of analysis and structure
of argument; evaluation of theory; application of relevant theory, research
methods and findings to the problem in question; presentation of
information to the intended audience.
0% Work showing no evidence of the knowledge, understanding and skills
appropriate to level 7. None of the learning outcomes are met.
OR
Work not submitted.
OR
Work giving evidence of serious academic misconduct
Formative Feedback
There will be an opportunity for formative feedback during the semester. You are
advised to start working on this assignment as early as possible so that you can
seek clarification from the module tutor regarding any questions you might have
during the semester. Note that tutors will not predict your grade, and you should not
take the lack of comment on any aspect of your work as indicating that it is correct.
You should make every effort to take advantage of formative feedback as tutors will
not comment on draft work at other times. Remember that you will get more useful
feedback from us by asking specific questions than just presenting us with your
documentation and asking, ‘Is this right?’
Page 6 of 8
The following penalties will be applied after any reductions in mark due to late
submission have been made, Penalties will be applied as defined in the University
Policy on Word Limits Policy.
https://northumbria-cdn.azureedge.net/-/media/corporate-website/new-sitecore-
gallery/services/academic-registry/documents/qte/assessment/guidance-for-students/pl013-
v002-word-limits-policy.pdf?modified=20200803200335.
(last accessed on 25th August 2020)
The actual word count is to be declared on the front of the assessment submission.
Page 7 of 8
For clarity: a late piece of work that would have scored 65%, 55% or 45% had it
been handed in on time will be awarded 55%, 45% or 35% respectively as 10% of
the total available marks will have been deducted.
Page 8 of 8