Question: Part A Overview (20 Marks) Your task is to complete and make a research report based on the following: Contents must include all the points:

Part A Overview (20 Marks) Your task is to complete and make a research report based on the following: Contents must include all the points: 1. Compare and contrast Open Source Security Testing Methodology Manual (OSSTMM), the Penetration Testing Execution Standard (PTES), and the Information Systems Security Assessment Framework (ISSAF) for analysing cyber security vulnerabilities in detail? 2. Demonstrate your skills to use Netcat to chat between two different hosts. (Take screenshots of your work and paste in the report) 3. How to create reverse shell using fake files? (Take screenshots of your work and paste in the report) 4. Demonstrate use of Powershell and powercat using ethical hacking methodologies. (Take screenshots of your work and paste in the report) 5. Discuss the Pros and cons to be anonymous on the Web
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
