Cyber Attack & Ethical Hacking Assignments

[Cyber Attack & Ethical Hacking

01a1] Unit 1 Assignment 1

Week 5

·         Attacking a Vulnerable Web Application and Database (Assignment 1)


To demonstrate your understanding of core concepts and procedures presented in this unit, you are required to complete the following:

  1. When should the initial penetration test be performed on a web server? Why?
  2. Compare and contrast a cross-site scripting attack and a reflective cross-site scripting attack.
  3. What Web application attacks are most likely to compromise confidentiality?
  4. What techniques can you use to mitigate and respond to SQL injection attacks?
  5. List some common techniques to identify Web application server vulnerabilities.
  6. Discuss your plan for ensuring penetration and web application testing are part of the implementation process.
  7. Why are you sometimes asked to set the DVWA security level to low
  8. Refer to the Attacking a Vulnerable Web Application and Database scoring guide to ensure that your work meets the grading criteria for this assignment.

Submission Requirements

  • Written communication:Writing should be clear and well organized, with no technical writing errors, as expected of a business professional.
  • Format:Typed, double-spaced lines.
  • Font:Times New Roman, 12 points.

[u05a2] Unit 5 Assignment 2

Vulnerabilities of Web Servers (Assignment 2) 4- pages


Attackers target websites for many different reasons. For example, an attacker may want to compromise the backend of an e-commerce website or take a site down using a denial of service or buffer overflow attacks. In fact, the attacker may be targeting your site’s visitors.  Since it may be difficult to anticipate an attacker’s motivation, sites should be hardened to prevent as many types of attacks as possible.


You were asked to participate with senior management in a Web conference discussing Web security. One speaker in correctly discussed installed SSL certificates, misconfiguration of Web servers, lack of server hardening, and poor authentication mechanisms as the most common threats to Web security. Another speaker added that the lack of security policy was the biggest risk. Then a Web developer discussed the threats posed by cross-site scripting (CSS), cross-site request forgery (CSRF), and buffer overflow. Finally, the last presenter discussed structured query language (SQL) injection attacks.

After the conference, the chief information security officer (CISO) of your organization asked you to write a report to summarize the information discussed during the conference.

Write a 4 page report in which you:

  • Describe cross-site scripting (CSS), cross-site request forgery (CSRF), buffer overflow, and structured query language (SQL) injection attacks
  • Compare cross-site scripting (CSS) and cross-site request forgery (CSRF).
  • Compare buffer overflow, and structured query language (SQL) injection attacks.
  • Discuss which attacks are used by hackers to attack database management systems.

Your assignment must be supported by a minimum of three recent, peer-reviewed references. Citations and references must be formatted using current APA style.

Structure your report as follows:

  • Title page.
  • The Main body (at least four pages); use headings to identify individual sections.
  • Summary and conclusion.
  • References page.

Capella academic integrity standards must be strictly followed.

Submission Requirements

  • Written communication:Writing should be clear and well organized, with no technical writing errors, as expected of a business professional
  • References:Include a minimum of three recent, peer-reviewed references.
  • APA style:Citations and references must be formatted using current APA style.
  • Length of the report:A minimum of four typed, double-spaced pages, excluding the title page and references page.
  • Font:Times New Roman, 12 points.

[u05d1] Unit 5 Discussion 1

Password Cracking (1-page Discussion)


Good password hygiene is an important component of securing any network. Attackers often attempt to compromise passwords. For this reason, it is good practice to use a unique password for each website, service, and application. Attackers have specialized tools to assist in cracking passwords; however, some passwords are more difficult to crack than others. Constructing unique, secure passwords may be challenging but some of this difficulty can be alleviated by using a password keeper.


You have been monitoring the traffic on your network using passive sniffing tools such as EtherApe, Dsniff, and Omnipeek. During your analysis, you notice a large amount of interesting traffic coming from two unknown devices. The devices have been isolated on a decoy network. You are asked to see if you can compromise the unknown devices using a password cracking tool so that you can gain a better understanding of the attackers’ intentions.

In your discussion post:

  • Describe three password cracking tools you can use to access the suspected computers without the attackers’ knowledge.
  • Compare and contrast the different password cracking tools.



Order a unique copy of this paper
(550 words)

Approximate price: $22

Our Basic features
  • Free title page and bibliography
  • Plagiarism-free guarantee
  • Unlimited revisions
  • Money-back guarantee
  • 24/7 support
Our Options
  • Writer’s samples
  • Expert Proofreading
  • Overnight delivery
  • Part-by-part delivery
  • Copies of used sources
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

AcademicWritingCompany guarantees

Our customer is the center of what we do and thus we offer 100% original essays..
By ordering our essays, you are guaranteed the best quality through our qualified experts.All your information and everything that you do on our website is kept completely confidential.

Money-back guarantee always strives to give you the best of its services. As a custom essay writing service, we are 100% sure of our services. That is why we ensure that our guarantee of money-back stands, always

Read more

Zero-plagiarism tolerance guarantee

The paper that you order at is 100% original. We ensure that regardless of the position you are, be it with urgent deadlines or hard essays, we give you a paper that is free of plagiarism. We even check our orders with the most advanced anti-plagiarism software in the industry.

Read more

Free-revision guarantee

The thrives on excellence and thus we help ensure the Customer’s total satisfaction with the completed Order.To do so, we provide a Free Revision policy as a courtesy service. To receive free revision the Academic writing Company requires that the you provide the request within Fifteen (14) days since the completion date and within a period of thirty (30) days for dissertations and research papers.

Read more

Privacy and Security policy

With, your privacy is the most important aspect. First, the academic writing company will never resell your personal information, which include credit cards, to any third party. Not even your lecturer on institution will know that you bought an essay from our academic writing company.

Read more

Adherence to requirements guarantee

The academic writing company writers know that following essay instructions is the most important part of academic writing. The expert writers will, therefore, work extra hard to ensure that they cooperate with all the requirements without fail. We also count on you to help us provide a better academic paper.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2020 at 10:52 AM
Total price:
The price is based on these factors:
Customer Academic level
Number of pages required
Urgency of paper