Write My Paper Button

Uncategorized

With regards to 2 rooms on TryHackMe platform, you are required to demonstrate your ability to carry out advanced exploitation techniques by creating a penetration

May 3, 2025 · 2 min read · By adminPro

📋 Table of Contents

    Assessment Brief

    1. With regards to 2 rooms on TryHackMe platform, you are required to demonstrate your ability to carry out advanced exploitation techniques by creating a penetration testing methodology. Specifically, you are required to perform and report on the following(Suggested word count 2000):

    ***We may request a presentation of your work if there are any concerns regarding the quality or execution of the assessment.***

    1. Design of a methodology
    2. Host enumeration and fingerprinting
    3. Service enumeration and fingerprinting
    4. Vulnrebility scanning
    5. Vulnrebility exploitation

    Please consider the links below for 2 machines that need to be completed for this assessment:

    • Room 1:

    https://tryhackme.com/jr/shuroom1

    • Room 2:

    https://tryhackme.com/jr/shuroom2


    Marking Criteria


    Comment


    Weight


    Methodology Design


    This section focuses on



    • Design of a methodology



    Firstly, a clear methodology


    should be presented,


    with sufficient detail so that a technical reader can


    understand the approach taken and what each stage.


    attempts to do.


    This can include but is not limited to:



    • The types of scans performed.


    • The types of vulnerabilities assessed.


    • The techniques used.


    • The tools to be used




    10%


    Methodology Effectiveness & Efficiency


    This section focuses on



    • Host enumeration and fingerprinting


    • Service enumeration and fingerprinting


    • Vulnerability Scanning



    The report should then reflect you executing each step of the methodology. It should show each stage being executed efficiently with the least number of commands used, each command should run with the optimal options. The way the tools/commands are used should simulate attack from a malicious hacker. The output of the commands should also be show clearly and the output should be in its most efficient form. Or with a filter (i.e grep) used to extract the most important/key pieces of information Overall – You should show the execution of each step of the Ethical Hacking Methodology you present. Marks are awarded for how effective and efficient you are.


    10%


    Specific Results


    This section focuses on each machine.



    • Vulnerability Exploitation




    • A clear and concise description of what the vulnerability is.


    • A comment or indicator on how serious the issue is


    • A repeatable example should be given.


    • An explanation on why each item presents a security risk.


    • Advice on how to fix/remediate the issues found.




    70%


    Report Summary


    A technical and management summary are both presented which are tailored for each audience and highlight the key findings and approach


    10%

    Need Help with Your Assignment?

    Post your brief free on TopEssay.com and post your brief free and get expert quotes in minutes.

    Get Expert Help Free →
    WeCreativez WhatsApp Support
    Our customer support team is here to answer your questions. Ask us anything!
    👋 Hi, how can I help?