Highlights
You are supposed to work individually on this assignment.
You are to perform a simulated penetration testing exercise as described in the assessment description.
Identify only one vulnerability, which may include open ports and potential weak points in the simulated network that you can exploit using Kali Linux tools.
Record a video showing how you identified and exploited the vulnerability.
The video should also show the tools used to identify and exploit the vulnerability.
Briefly explain the potential risks and impact on the organisation's network based on the chosen vulnerability.
Include in the video a visual aid (diagram) to support your submission and any other claims.
Conclude the video by showcasing your recommendations and mitigation strategies.
Submit your video to MyKBS once completed.
This assessment is to be completed individually. In this assessment, you are tasked with conducting penetration testing of an organisation's IT environment. The objective is to identify and exploit cybersecurity vulnerabilities using a simulated network for the organisation, replicating a real-world scenario. This assessment will cover the fundamental concepts learned in the initial weeks of the subject, focusing on reconnaissance, vulnerability assessments, and footprinting.
The objective of this assessment is to assess your practical skills in identifying, analysing, exploiting, documenting, and reporting cyber-attack vulnerabilities, focusing on the content covered in Weeks 1 to 3. This will include the following:
Reconnaissance and Information Gathering
Footprinting and Enumeration
Vulnerability Assessment
Demonstration of Exploitation
In this assessment:
You will simulate a penetration testing exercise using tools and systems relevant to penetration testing in a controlled lab environment that simulates a computer system, network, or web application.
Submit a video recording of the simulated penetration testing exercise.
The simulated exercise will include tasks related to:
Utilising Kali Linux and penetration testing tools to perform the simulated penetration testing scenario.
Conducting reconnaissance and vulnerability assessments using Kali Linux tools.
Picking only ONE vulnerability based on your vulnerability assessment, exploiting the vulnerability, and showing the methods and strategies used.
Providing recommended mitigation measures based on concepts learned from Week 1 to Week 3.
This assessment is designed to equip you with basic practical penetration testing skills which are essential for securing organisations' digital assets and infrastructure.
The assessment aligns with real-world scenarios where penetration testers are tasked with identifying and exploiting vulnerabilities to strengthen an organisation's security posture.
This assessment therefore prepares you for cybersecurity roles that require you to proactively identify, exploit, and mitigate security vulnerabilities in different organisations.
This assessment is useful for any aspiring penetration tester, cybersecurity professional, and organisations looking to strengthen their security teams by hiring individuals with hands-on penetration testing experience.
Completing this assessment will equip you with the necessary practical skills needed to contribute positively to various cybersecurity roles.
LO1: Evaluate appropriate countermeasures to mitigate the risk of unauthorised access, hacks, and exploits to systems, networks, and applications.
LO2: Investigate cyber-attack techniques on computer systems, networks, and web applications.
LO3: Evaluate existing defensive security measures.
The assessment requires students to independently conduct a simulated penetration testing exercise on a fictional organisational IT environment. The primary objective is to identify, analyse, exploit, and report a single cybersecurity vulnerability within the simulated network using Kali Linux tools.
Students must:
Perform reconnaissance, footprinting, and vulnerability assessment activities.
Select one exploitable vulnerability (e.g., open ports, weak services, misconfigurations).
Use Kali Linux tools to demonstrate exploitation.
Create and submit a video recording showcasing:
The reconnaissance and vulnerability scanning process
The selected vulnerability and exploitation steps
Tools used
A visual diagram supporting the findings
Risks and impacts of the vulnerability
Recommended mitigation strategies
Apply concepts learned in Weeks 1–3, focusing on security principles, attack techniques, and defensive measures.
The purpose is to provide practical penetration testing experience relevant to real-world cybersecurity roles and the following Subject Learning Outcomes:
LO1: Mitigating risks of unauthorised access and exploitation
LO2: Investigating cyber-attack techniques
LO3: Evaluating defensive security measures
The Academic Mentor approached the assessment by breaking down each stage into clear, manageable steps, ensuring the student understood both the technical tasks and underlying principles.
The mentor first helped the student interpret the assessment brief:
Identifying the purpose of the simulated environment
Understanding the requirement to choose only one vulnerability
Recognising the need for a video demonstration
Reviewing Week 1–3 concepts relating to reconnaissance, vulnerabilities, and countermeasures
This ensured the student had full clarity before beginning any technical work.
The mentor guided the student in:
Launching Kali Linux
Verifying network connectivity with the simulated target system
Listing essential tools such as Nmap, Netcat, Nikto, and OpenVAS
This prepared the student for accurate and safe testing within a controlled environment.
The mentor demonstrated how to begin with non-intrusive information gathering:
Using Nmap to scan hosts and identify open ports
Conducting basic footprinting to map services and potential weaknesses
Documenting initial observations for inclusion in the final report/video
The student learned the importance of systematic scanning before attempting exploitation.
Next, the mentor helped the student:
Interpret scan results
Identify services with known vulnerabilities
Perform targeted scans using tools such as:
Nmap scripts (NSE)
Nikto for web server vulnerabilities
The mentor stressed the requirement to choose one vulnerability that can be realistically exploited in the simulation.
Once a vulnerability (e.g., outdated service version or open port with weak configuration) was identified, the mentor guided the student through:
Understanding how the vulnerability works
Using an appropriate exploitation tool (e.g., Metasploit)
Executing a safe, controlled exploitation to gain access or privileges
The student was reminded to document commands and outputs for the video submission.
The mentor instructed the student on how to:
Assess organisational risks associated with the exploited vulnerability
Explain potential impacts such as unauthorised access, data leaks, or system compromise
Present risks clearly and professionally for academic evaluation
To meet the visual aid requirement, the mentor showed the student how to:
Develop a simple network diagram
Highlight the attack path
Present mitigation recommendations linked to LO1–LO3
Recommendations covered:
Patching
Access control improvements
Firewall adjustments
Monitoring and logging enhancements
The mentor guided the student in:
Structuring the video for clarity
Demonstrating each stage logically
Using screen capture tools
Summarising findings and mitigation strategies professionally
The student then submitted the completed video to MyKBS as required.
By following the mentor’s structured guidance, the student successfully:
Conducted a full penetration testing workflow
Identified and exploited a valid vulnerability
Demonstrated understanding of real-world cybersecurity testing processes
Presented risks, impacts, and mitigation strategies
Prepared a clear, evidence-based video submission
LO1: Evaluated countermeasures by recommending mitigation strategies
LO2: Investigated and demonstrated cyber-attack techniques using Kali Linux
LO3: Assessed defensive measures and identified gaps in the simulated network
Looking for guidance on completing your TECH5100: Penetration Testing Assessment? Our expertly prepared sample solution can help you understand the structure, approach, and expected academic standards for this task. The downloadable file is designed to support your learning, offering clarity on how to conduct reconnaissance, identify vulnerabilities, and present your findings effectively.
Important: This sample is strictly for reference and study purposes only. Submitting it as your own work may result in plagiarism penalties under your institution’s academic integrity policies. Always use sample solutions to learn not to copy.
If you need a personalised, high-quality submission, you can order a fresh, plagiarism-free assignment solution crafted exclusively for you by experienced academic writers. Your custom solution will be original, aligned with your requirements, and tailored to your university guidelines.
100% original and plagiarism-free content
Written by qualified cybersecurity and IT academic experts
Meets your exact assessment instructions and rubric
Delivered on time with guaranteed confidentiality
Helps you understand the topic deeply while staying academically safe
Download Sample Solution Order Fresh Assignment
© Copyright 2026 My Uni Papers – Student Hustle Made Hassle Free. All rights reserved.