CMT118 Malware Analysis and Vulnerability Assessment
Task 1: Malware Analysis – 30 marks
As explained above, you will be given access to two pieces of malware. You must perform
static and dynamic analysis on both to collect evidence and complete the following subtasks by referring to the evidence you collected:
1. List the malware’s significant imports and strings, and its host-based and networkbased indicators. (10 marks)
2. Describe how the malware works. (10 marks)
3. Describe the purpose the malware tries to achieve. (10 marks)
Your report must clearly separate your responses to each of these sub-tasks.
Task 2: Vulnerability Assessment – 70 marks
The VM images that you will be provided with are linked together in a network topology.
You will log into the Kali Linux VM and you will conduct all your attacks from that VM. You
should not modify the network topology. You should clearly follow a systematic pentesting
methodology, you should clearly identify and describe each vulnerability you find and how
you exploit it, and you should clearly propose how to fix it.
本网站支持 Alipay WeChatPay PayPal等支付方式
E-mail: firstname.lastname@example.org 微信号:vipnxx