Assignment - Last
Assignment - Last
Instructions:
2. Identify and describe at least three OSINT tools that ethical hackers use for
reconnaissance.
3. Conduct a simple OSINT exercise: Search for public information about a well-known
company (e.g., Apple, Tesla) using Google Dorking or other OSINT techniques.
What type of data did you find?
4. Explain how an attacker can use social media intelligence (SOCMINT) to gather
information about a target.
5. What is social engineering, and why is it one of the most effective hacking
techniques?
6. Describe the steps involved in a successful phishing attack and provide a real-
world example.
7. Compare phishing and vishing—how do they work, and how can users protect
themselves?
9. Explain how Artificial Intelligence (AI) is changing the field of ethical hacking.
10. Identify an AI-powered cybersecurity tool and describe how it is used for
penetration testing or threat detection.
11. What are the risks of using AI in cybersecurity? Could AI be used by both attackers
and defenders?
12. Discuss a real-world case where AI was used either to defend or attack a system.
13. Select a major cybersecurity attack from the past 10 years (e.g., WannaCry,
SolarWinds, Tesla API breach).
14. Ethical hackers often conduct red teaming exercises. What is red teaming, and how
does it differ from penetration testing?
15. List and describe at least three different cybersecurity career paths related to
ethical hacking.
16. What skills and certifications are required for someone to become a penetration
tester?
17. What is the difference between a Red Team Specialist and a Blue Team Security
Analyst?
18. If you were to choose a career in ethical hacking, which role would you prefer and
why?
19. What is the Dark Web, and how do ethical hackers use it for cybersecurity
research?
20. Explain the concept of bug bounty programs and how they help organizations
improve security.
21. What are hardware-based hacking techniques (e.g., RFID cloning, USB drops),
and how can companies defend against them?
22. Predict one major cybersecurity challenge that organizations might face in the
next five years. How can ethical hackers help mitigate this threat?
Bonus Question 1: Ethical hackers must follow strict guidelines. What are the key
principles of the Hacker Code of Ethics?
Bonus Question 2: Research and find a real-life ethical hacker (e.g., Kevin Mitnick,
Marcus Hutchins). Summarize their contribution to cybersecurity.
Bonus Question 3: Can ethical hacking ever be considered unethical? Provide an
argument for or against.
Submission Guidelines: