Even the smartest students need writing assistance at some point during their academic career. Should you lock yourself in a room and spend the entire weekend trying to write a paper? We promise you that the paper that you pay for won’t be resold or submitted elsewhere. It will also be written according to the instructions that you and your professor provide. Our excellent essays stand out among the rest for a reason. Don’t just take our word, check them out by yourself.
Order a Similar Paper Order a Different Paper
In this assignment, you are expected to perform security exploits specified in this document
and design a strategic plan to improve the system security for a remote system, firstly using
the available tools from BackTrack/Kali and GNU/Linux distribution, and a deliberately
insecure web application – WebGoat v8(https://github.com/WebGoat/WebGoat). The
JDK v11 with Java Virtual Machine (https://www.java.com/en/download/) is required to
run WebGoat.Meanwhile, you can download BackTrack and any appropriate (free and
open-source) tools (e.g. Wireshark) provided by practical labs or from the tools vendor’s
official website to complete this assignment. The only difference is the official websites
will provide the latest released version with some new features and revision but maybe not
stable. It is your choice to work on which version that is suited for your computer OS and
hardware environments. There are no limitations on either Mac, Linux or Windows etc.
NOTE: You are not to use any commercial security-related or hacking products
for this assignment.
There are two parts to this assignment:
• Part A will require you finish the “Challenges” in the WebGoat, while it is to
test your understanding of a particular adversary attack and how to counter that
• Part B will require the research work on IDS/IPS, Firewall & Honeypot.
In Part A, you are required to answer the questions with justifiable implementations.
These implementations need to be documented in detail. The document must have stepby-step details on what you did to solve the question, including any script codes used
to answer the requirements. You are also required to provide images (screen dumps) to
show the key steps leading to your solution. These images can be taken using printscreen or any other screen capture method. These images must be embedded in the
document with appropriate labelling and descriptions.
In Part B, you need to address the given research questions on the IDS, Firewalls and
In addition, the document format shall be neatly organised and have the proper heading
and subheading for the marker’s easy marking process. It is suggested to clearly indicate
which part and what question you are attempting to complete. It is suggested to clearly
indicate the stage your solution is used for.