Cyber Security

Vulnerability description written report:

a. Introduction (1-2 paragraphs) providing an overview of the report.

b. Explanation and documentation of vulnerability. This should explain all the technical details, the outcome of exploitation and affected systems.

c. Mitigation and prevention strategies for the exploit. This should be more than patch the software. You should refer to your explanation of the vulnerability and explain how and why the mitigations are suitable (no more than 1 page).

d. Plan for exploiting vulnerability (no more than 1 page).

This is a mandatory marked component of the assignment.

3. Vulnerability exploitation written report:

a. Introduction (1-2 paragraphs) providing an overview of the report.

b. Explanation and documentation of vulnerability. This can be taken from the previous report but should be improved as required.

c. Documentation for setting up the test environment. Screenshots are very useful here. All steps specific for the vulnerability must be explained.

d. Demonstration of the exploit in action. You must explain all steps and the outcome. You must use screenshots to illustrate the different steps and the outcome.

Our customer support team is here to answer your questions. Ask us anything!