Deakin University SIT182: Cyber Security Tools Assignment
VerifiedAdded on 2022/07/28
|25
|2512
|39
Homework Assignment
AI Summary
This assignment focuses on real-world practices for cyber security, utilizing the Kali Linux environment. The student begins by starting the Kali VM and running the terminal, then proceeds to explore various tools. The assignment covers the use of the 'whois' command to gather information about domain names like deakin.edu.au, discorapp.com, and yahoonews.co. It analyzes the name servers and DNSSEC configurations. Further, the assignment explores inverse mapping, DNS interrogation using nslookup, and the use of traceroute to understand network paths. The student also investigates the differences between NAT and bridged network modes in VirtualBox and the usefulness of traceroute for attackers. Finally, the assignment introduces Nmap as a network scanning tool and includes a bibliography of relevant resources.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.