Australian universities have been frequent targets of cyberattacks due to their valuable research data and intellectual property.
Select three cybersecurity incidents involving Australian universities.
For each incident, analyze:
Date & context of the attack
Attack vector used (e.g., phishing, malware, insider threats)
Tactics, Techniques, and Procedures (TTPs) using MITRE ATT&CK framework
Step-by-step attack execution
Damages caused (data breaches, financial loss, reputational impact)
Prevention measures (best security practices)
Lessons learned from each case
Recommendations for La Trobe University's IT security team
Strengthen cybersecurity
Improve incident response
Reduce risks
You will conduct a vulnerability assessment on the MetaSploitable machine using Nessus.
Service Identification
Identify open ports & running services with version details
Vulnerability Discovery
List known vulnerabilities (include CVE IDs, CVSS scores)
Check if vulnerabilities are exploitable (provide Exploit-DB/GitHub links)
Vulnerability Prioritization
Rank vulnerabilities by CVSS score
Summarize top 6 critical vulnerabilities
Risk Assessment & Preventive Measures
Explain potential exploitation risks
Recommend patching, configuration hardening, firewall rules
Include Nessus scan screenshots showing:
Ports, services, CVE IDs
CVSS scores, exploit verification evidence
Using Metasploit Framework, exploit six vulnerabilities on MetaSploitable.
Selection of Exploits
Choose six different exploits targeting MetaSploitable
Provide CVE ID, exploit name, attack method
Execution & Documentation
Demonstrate each exploit with screenshots
Show successful access (shell access, privilege escalation, etc.)
If exploit fails, explain why and try alternatives
Summary Table
Include details like CVE ID, service name, port number, exploit method, success/failure
Analysis & Findings
Explain why exploit worked or failed
Describe potential impact of attack
Mitigation Recommendations
Suggest patching, service hardening, firewall rules
Evidence Collection
Screenshots showing successful exploits & student ID in terminal
Crack Windows XP SAM file password hashes using OphCrack.
Document steps taken to crack passwords
Submit recovered passwords
Include screenshots for each step
Analyze PTVis from the research paper: S. Zheng et al., "PTVis: Visual Narrative and Auxiliary Decision to Assist in Comprehending the Penetration Testing Process," IEEE Access, 2020.
PTVis and Penetration Testing
Explain how PTVis supports penetration testing
Why visualization is crucial in penetration testing
Proposed Enhancements
Suggest one enhancement for PTVis
Justify how it improves customized exploration
Critical Evaluation
Evaluate challenges PTVis solves
Discuss how its absence would impact penetration testers
Submit 1 PDF file containing all answers.
Follow academic integrity policies (use citations, avoid plagiarism).
Upload via LMS before May 18, 2025.
© Copyright 2026 My Uni Papers – Student Hustle Made Hassle Free. All rights reserved.