NPT&EH Coursework 2015-16 v1.0
NPT&EH Coursework 2015-16 v1.0
NPT&EH Coursework 2015-16 v1.0
Scenario
You have been tasked with performing a security assessment of a customer network. Specifically, you are asked to
complete a full penetration test against the given target network and deliver any findings in the form of a written
report. You have been provided with a topology of the network (Figure 1) and the target network IP address as
detailed below:
The purpose of this assessment is to verify the security posture of the servers running in the network range given:
Note:
The scope of the full penetration test is limited to the two servers. Do not attempt to attack the router (VyOS) as this
may cause damage to the device and unnecessary service downtime to the other users in the network. You should
assume that you have full legal rights and permission to simulate an attack to the given network.
After completing the penetration test, you are required to create a report that documents your findings in a clear and
concise manner. It will be assessed based on content. The report should be a summary of the outcomes you have
learned based on the execution of the penetration test. The structure of the report should be as follows:
Outline here the specific goals of the Penetration Test and the major findings of the exercise. The executive summary
should be written to address non-technical audience and should contain the following sections:
Background: The background section should be a brief section explaining the reader the overall purpose of
the test. The section should include a brief statement specifying the scope and objectives of the test and the
tasks accomplished.
Hint: Write the executive summary after you have completed of the rest of the report. It will be a lot easier to
summarise your methodology, findings and recommendations.
Explain in details the methodology used to perform the test. This should include an explanation of the tools used and
a rationale for their use.
Identified vulnerabilities, explaining their rating (e.g. CVE definition & CVSS scoring) impact (what could
happen if exploited?) and likelihood (What is the chance of a hacker exploiting it?)
Exploits used to attack the systems and rationale behind their use.
- Reference [5 Marks]
Add details of material by other authors used on your report.
Additionally, a pod is available in Netlab to complete the security assessment of the network given. Instructions and
login details will be given only to students who request them. If you are interested in this option for completing the
coursework, please email me at [email protected] providing your full name and student ID. Please allow 2
to 3 days for the email to be processed.
Assessment
This coursework is assessing your ability to understand the principles and methodology required to perform a
security assessment by means of a penetration test. The purpose of this coursework is to enable you to demonstrate
your penetration testing capabilities and reporting skills. Your coursework mark will be awarded based on your
report. This coursework assessment makes up 50% of the overall award for the module. The pass mark is 40%. To
pass the module you must pass both assessed elements (coursework and final written exam).
Submission
The coursework (in the form of a report) should be submitted as hardcopies (stapled or bound, please no folders). An
electronic copy of all elements of your submission must also be uploaded to GCULearn in the defined format. Please
ensure that you follow the separate guidelines for the correct uploading onto GCULearn. Any submissions not
following the guidelines will be rejected.
Submission Date
The final submission date is no later than 12pm on Wednesday 9th of December 2015.
GCULearn
Any additional information, errata or updates will be communicated on GCULearn (Blackboard). It is the student's
responsibility to check for updates.