Deakin University SIT182: Cyber Security Tools Assignment

Verified

Added on  2022/07/28

|25
|2512
|39
Homework Assignment
AI Summary
This assignment focuses on real-world practices for cyber security, utilizing the Kali Linux environment. The student begins by starting the Kali VM and running the terminal, then proceeds to explore various tools. The assignment covers the use of the 'whois' command to gather information about domain names like deakin.edu.au, discorapp.com, and yahoonews.co. It analyzes the name servers and DNSSEC configurations. Further, the assignment explores inverse mapping, DNS interrogation using nslookup, and the use of traceroute to understand network paths. The student also investigates the differences between NAT and bridged network modes in VirtualBox and the usefulness of traceroute for attackers. Finally, the assignment introduces Nmap as a network scanning tool and includes a bibliography of relevant resources.
chevron_up_icon
1 out of 25
circle_padding
hide_on_mobile
zoom_out_icon
Loading PDF…
[object Object]