Background
Australian universities have been frequent targets of cyberattacks due to their valuable research data and intellectual property.
Tasks
- Select three cybersecurity incidents involving Australian universities.
- For each incident, analyze:
- Date & context of the attack
- Attack vector used (e.g., phishing, malware, insider threats)
- Tactics, Techniques, and Procedures (TTPs) using MITRE ATT&CK framework
- Step-by-step attack execution
- Damages caused (data breaches, financial loss, reputational impact)
- Prevention measures (best security practices)
Deliverables
- Lessons learned from each case
- Recommendations for La Trobe University’s IT security team
- Strengthen cybersecurity
- Improve incident response
- Reduce risks
2. Vulnerability Assessment
Background
You will conduct a vulnerability assessment on the MetaSploitable machine using Nessus.
Tasks & Deliverables
- Service Identification
- Identify open ports & running services with version details
- Vulnerability Discovery
- List known vulnerabilities (include CVE IDs, CVSS scores)
- Check if vulnerabilities are exploitable (provide Exploit-DB/GitHub links)
- Vulnerability Prioritization
- Rank vulnerabilities by CVSS score
- Summarize top 6 critical vulnerabilities
- Risk Assessment & Preventive Measures
- Explain potential exploitation risks
- Recommend patching, configuration hardening, firewall rules
Evidence Collection
- Include Nessus scan screenshots showing:
- Ports, services, CVE IDs
- CVSS scores, exploit verification evidence
 3. Exploitation Using Metasploit
Background
Using Metasploit Framework, exploit six vulnerabilities on MetaSploitable.
Tasks & Deliverables
- Selection of Exploits
- Choose six different exploits targeting MetaSploitable
- Provide CVE ID, exploit name, attack method
- Execution & Documentation
- Demonstrate each exploit with screenshots
- Show successful access (shell access, privilege escalation, etc.)
- If exploit fails, explain why and try alternatives
- Summary Table
- Include details like CVE ID, service name, port number, exploit method, success/failure
- Analysis & Findings
- Explain why exploit worked or failed
- Describe potential impact of attack
- Mitigation Recommendations
- Suggest patching, service hardening, firewall rules
- Evidence Collection
- Screenshots showing successful exploits & student ID in terminal
Â
4. Cracking Passwords with OphCrack
Background
Crack Windows XP SAM file password hashes using OphCrack.
Deliverables
- Document steps taken to crack passwords
- Submit recovered passwords
- Include screenshots for each stepÂ
5. Research Paper Review
Background
Analyze PTVis from the research paper: S. Zheng et al., “PTVis: Visual Narrative and Auxiliary Decision to Assist in Comprehending the Penetration Testing Process,” IEEE Access, 2020.
Tasks & Deliverables
- PTVis and Penetration Testing
- Explain how PTVis supports penetration testing
- Why visualization is crucial in penetration testing
- Proposed Enhancements
- Suggest one enhancement for PTVis
- Justify how it improves customized exploration
- Critical Evaluation
- Evaluate challenges PTVis solves
- Discuss how its absence would impact penetration testers
Submission Details
- Submit 1 PDF file containing all answers.
- Follow academic integrity policies (use citations, avoid plagiarism).
Select three cybersecurity incidents involving Australian universities. For each incident, analyze: Date & context of the attack Attack vector used (e.