0% found this document useful (0 votes)
4 views3 pages

Assignment - Last

The document outlines an assignment focused on advanced ethical hacking concepts, divided into six sections covering OSINT, social engineering, AI's role, real-world incidents, career paths, and emerging threats. Each section includes specific questions that require detailed explanations, real-world examples, and technical insights. Additionally, there is an optional bonus section for extra credit related to ethical hacking principles and notable figures in the field.

Uploaded by

avishkabandara
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views3 pages

Assignment - Last

The document outlines an assignment focused on advanced ethical hacking concepts, divided into six sections covering OSINT, social engineering, AI's role, real-world incidents, career paths, and emerging threats. Each section includes specific questions that require detailed explanations, real-world examples, and technical insights. Additionally, there is an optional bonus section for extra credit related to ethical hacking principles and notable figures in the field.

Uploaded by

avishkabandara
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Assignment: Exploring Advanced Ethical Hacking Concepts

Instructions:

Answer the following questions with well-structured explanations and real-world


examples. Use technical details where necessary to demonstrate your understanding of
ethical hacking beyond the basics.

Section 1: OSINT and Reconnaissance

1. Define OSINT (Open-Source Intelligence) and explain how it is useful in ethical


hacking.

2. Identify and describe at least three OSINT tools that ethical hackers use for
reconnaissance.

3. Conduct a simple OSINT exercise: Search for public information about a well-known
company (e.g., Apple, Tesla) using Google Dorking or other OSINT techniques.
What type of data did you find?

4. Explain how an attacker can use social media intelligence (SOCMINT) to gather
information about a target.

Section 2: Social Engineering Attacks

5. What is social engineering, and why is it one of the most effective hacking
techniques?

6. Describe the steps involved in a successful phishing attack and provide a real-
world example.

7. Compare phishing and vishing—how do they work, and how can users protect
themselves?

8. Imagine you are a security awareness trainer in a company. Design a three-step


training plan to help employees recognize and avoid social engineering attacks.

Section 3: The Role of AI in Ethical Hacking

9. Explain how Artificial Intelligence (AI) is changing the field of ethical hacking.
10. Identify an AI-powered cybersecurity tool and describe how it is used for
penetration testing or threat detection.

11. What are the risks of using AI in cybersecurity? Could AI be used by both attackers
and defenders?

12. Discuss a real-world case where AI was used either to defend or attack a system.

Section 4: Real-World Cybersecurity Incidents

13. Select a major cybersecurity attack from the past 10 years (e.g., WannaCry,
SolarWinds, Tesla API breach).

• Summarize how the attack occurred.

• What vulnerabilities were exploited?

• What lessons can be learned from this incident?

14. Ethical hackers often conduct red teaming exercises. What is red teaming, and how
does it differ from penetration testing?

Section 5: Ethical Hacking Career Paths

15. List and describe at least three different cybersecurity career paths related to
ethical hacking.

16. What skills and certifications are required for someone to become a penetration
tester?

17. What is the difference between a Red Team Specialist and a Blue Team Security
Analyst?

18. If you were to choose a career in ethical hacking, which role would you prefer and
why?

Section 6: Emerging Threats and Future of Ethical Hacking

19. What is the Dark Web, and how do ethical hackers use it for cybersecurity
research?
20. Explain the concept of bug bounty programs and how they help organizations
improve security.

21. What are hardware-based hacking techniques (e.g., RFID cloning, USB drops),
and how can companies defend against them?

22. Predict one major cybersecurity challenge that organizations might face in the
next five years. How can ethical hackers help mitigate this threat?

Bonus Section (Optional, Extra Credit)

Bonus Question 1: Ethical hackers must follow strict guidelines. What are the key
principles of the Hacker Code of Ethics?
Bonus Question 2: Research and find a real-life ethical hacker (e.g., Kevin Mitnick,
Marcus Hutchins). Summarize their contribution to cybersecurity.
Bonus Question 3: Can ethical hacking ever be considered unethical? Provide an
argument for or against.

Submission Guidelines:

• Answers should be well-structured with clear explanations.

• Use real-world examples wherever possible.

• Cite sources if referring to external information.

• Bonus questions are optional but will add extra credit.

You might also like