Getting to know the Cyber Range LessonExercise_Fall2020

docx

School

George Mason University *

*We aren’t endorsed by this school

Course

420

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

5

Uploaded by ProfCatMaster1062

Report
NAME: ALICIA GARCIA GNUMBER: G01468985 Laboratory Exercise 1 – Getting to know the Cyber Range Due Date: 1/28/2023 Points Possible: 1 1. Overview For this lesson, students will learn how to use the Cyber Range. The Kali Linux with Metasploitable or Teach Cyber VM (use example.kali.com when prompted to choose) will be used to complete basic tasks so that students become acclimated to the environment. This is largely a review for experienced Cyber Range users. 2. Resources required This exercise requires a Kali Linux VM running in the Cyber Range. 3. Initial Setup For this exercise, you will log in to your Cyber Range account and select the Kali Linux with Metasploitable or Teach Cyber with Kali, then click “start” to start your environment and “join” to get to your Linux desktop. Choose “kali.com” if and when prompted. 4. Tasks Task 1: Changing the terminal initial title working directory Open a terminal and click Edit > Preferences… © 2021 Cyber Range. Created by R. Eric Kiser. (CC BY-NC-SA 4.0)
Introduction to Information Security Term: Spring 2023 The Terminal Preferences dialog box will appear. To change the Initial title , type your name in the title box. It is important to type your name, as the screenshots that will be turned in later in the course will rely on your name being in the terminal title. Check the “ Working directory ” box and change it to /home/student/Desktop . Be sure to capitalize the D . This will help with efficiency as we progress. You will not have to search for your files as they will appear on the desktop. Task 2: Changing the color scheme Choose the Colors tab in the Terminal Preferences. Here you can change the Text color . Uncheck the Use system theme colors box. I recommend “hacker green” because every great hacker wants to look like they are in the Matrix! I also happen to think it is easier on the eyes. Click on Close at the bottom. © 2021 Cyber Range. Created by R. Eric Kiser. (CC BY-NC-SA 4.0) 2
Introduction to Information Security Term: Spring 2023 Task 3: User manual Most Kali tools and commands have a usage manual. To access the manual, all you need to do is type man <tool>. Let’s try this with the ls command. Type man ls . The manual will be displayed with the tool usage. To exit out of the manual, press q to quit. Task 4: Separating programs from the terminal Oftentimes we will need to run programs directly from the terminal. Leafpad is a text editor like notepad. From the terminal, you can type leafpad <file you want to open> . The issue with this is that you lose the function of your terminal window. © 2021 Cyber Range. Created by R. Eric Kiser. (CC BY-NC-SA 4.0) 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Introduction to Information Security Term: Spring 2023 Type leafpad and press enter. Now return to the terminal and close out of it (Ctrl c). Notice Leafpad closes as well. Adding “& disown” to this command will separate a GUI program from the terminal window. Type leafpad & disown . By using the “& disown” with a command, you should see that if you go back to the terminal window, you can now execute other commands. Try executing the ls command. If you close the terminal window, the Leafpad app will still run. KSAs Addressed From (https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf ) Knowledge: K0130: Knowledge of virtualization technologies and virtual machine development and maintenance. © 2021 Cyber Range. Created by R. Eric Kiser. (CC BY-NC-SA 4.0) 4
Introduction to Information Security Term: Spring 2023 K0609 : Knowledge of virtual machine technologies . Skills: S0073: Skill in using virtual machines. (e.g., Microsoft Hyper-V, VMWare vSphere, Citrix XenDesktop/Server, Amazon Elastic Compute Cloud, etc.). Abilities: A0082 : Ability to effectively collaborate via virtual teams. NSA/DHS CAE Knowledge Units: https://www.iad.gov/NIETP/documents/Requirements/CAE- CD_2019_Knowledge_Units.pdf (you may need to accept an invalid iag.gov SSL certificate to reach this PDF) Basic Cyber Operations (BCO) Penetration Testing (PTT) © 2021 Cyber Range. Created by R. Eric Kiser. (CC BY-NC-SA 4.0) 5