Expert Academic Assignment Help — Plagiarism-Free, On Time & Confidential — Get Free Quote →
📘 Uncategorized

Scenario- An attacker sends a spear phishing message with the subject "Free Flaming Moe’s in the Cafeteria at after work: Details in Attachment" containing a malicious Microsoft Word attachment to Homer Simpson who opens

· 📅 April 30, 2026 · ⏱ 3 min read
✍️ Need help with this assignment? Get expert quotes in minutes — free to submit. ✍️ Get Writing Help FREE

Candidate Exercise Instructions

1.   Diagram: Please create a diagram that depicts the following scenario where Springfield Power Plant's network has been breached by an attacker. Visio, PowerPoint, LucidChart (free), GraphViz (free) or other software may be used to create the diagram.

Scenario

o        An attacker sends a spear phishing message with the subject "Free Flaming Moe’s in the Cafeteria at after work: Details in Attachment" containing a malicious Microsoft Word attachment to Homer Simpson who opens the attachment and enables Macros when prompted to view the sweet, sweet Flaming Moe’s details. (mmmmmmmm….Flaming Moe’s Should be called the Flaming Homer.)  

o        Once opened, a macro is executed which runs a PowerShell command that establishes a command and control (C2) channel to a domain (https://d35fkdjh4gt99.cloudfront.net, 52.85.89.218) which ultimately resolves to a machine controlled by the attacker (Frankenstein Grimes) in Amazon's EC2 cloud. o Frankenstein Grimes escalates his privileges on Homer Simpson's computer ( HSCRBN BLB, 172.16.22.4) to gain administrative access and extracts password hashes using Mimikatz.

Frank Grimes then uses the shared local administrator password obtained from Homer Simpsons computer to move laterally on the network to Wayland Smithers' computer (WS-ULLMAN, 172.16.10.42). o Wayland Smithers' computer contains an unprotected SSH private key file for an SSH jump box that grants access to the SCADA systems network within the power plant.  o Using those passwords, Frankenstein Grimes authenticates using PuTTY to the jump box (SCRATCHY, 10.253.65.85) and then uses Nmap to scan for open ports on the SCADA network (1.1.0.0/23) for open port TCP/666 which controls the reactor.

o        Frank identifies open port TCP/666 and connects to the reactor (SIDESHOW90, 1.1.1.230) over Telnet without a password required. o Frank then places malware on the system designed to alter the core temperature of the reactor in the next 30 days.

o        Frankenstein Grimes then steps back through his attack chain leaving ransomware along the way.

2.   Defensive Controls Mapping: Note for each step which defensive toolset or process would be used to help mitigate and detect what Frank Grimes has been able to successfully do as an attacker. We expect detailed explanations in paragraph form. If it is not already obvious, the exercise is Simpsons-themed, so please have fun with it!

 

Plagiarism Free Assignment Help

Expert Help With This Assignment — On Your Terms

  • ✓ Native UK, USA & Australia writers
  • ✓ 100% Plagiarism-Free — Turnitin report included
  • ✓ Deadline from 3 hours
  • ✓ Unlimited free revisions
  • ✓ Free to submit — compare quotes
StudyLink Expert
Academic Expert · StudyLink
Expert academic writer and education specialist helping students in the UK, USA, and Australia achieve their best results.
Need help with your own assignment?

Our expert writers can help you apply everything you have just read — to your actual assignment, brief, and marking criteria.

Get Expert Help Now →
📝 Free Submission — No Card Required

Need Help With This Assignment?

Our verified experts deliver 100% original, plagiarism-free work to your exact brief and marking criteria. Submit free — compare quotes — choose your expert.

  • ✓ UK, USA & Australia experts
  • ✓ Deadline from 3 hours
  • ✓ Free Turnitin report
  • ✓ Unlimited free revisions
✍️ Write My Assignment FREE Get A Free Quote →

No credit card · No commitment · First quote in minutes

You May Also Find Helpful
View All Articles →