Deakin University SIT182: Cyber Security Tools Assignment

Verified

Added on  2022/07/28

|25
|2512
|39
Homework Assignment
AI Summary
This assignment focuses on real-world practices for cyber security, utilizing the Kali Linux environment. The student begins by starting the Kali VM and running the terminal, then proceeds to explore various tools. The assignment covers the use of the 'whois' command to gather information about domain names like deakin.edu.au, discorapp.com, and yahoonews.co. It analyzes the name servers and DNSSEC configurations. Further, the assignment explores inverse mapping, DNS interrogation using nslookup, and the use of traceroute to understand network paths. The student also investigates the differences between NAT and bridged network modes in VirtualBox and the usefulness of traceroute for attackers. Finally, the assignment introduces Nmap as a network scanning tool and includes a bibliography of relevant resources.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Loading PDF…
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]