Getting to know the Cyber Range LessonExercise_Fall2020
docx
keyboard_arrow_up
School
George Mason University *
*We aren’t endorsed by this school
Course
420
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
5
Uploaded by ProfCatMaster1062
NAME: ALICIA GARCIA
GNUMBER: G01468985
Laboratory Exercise 1 – Getting to know the Cyber Range Due Date: 1/28/2023
Points Possible: 1
1. Overview
For this lesson, students will learn how to use the Cyber Range. The Kali Linux with Metasploitable or Teach Cyber VM (use example.kali.com when prompted to choose) will be used to complete basic tasks so that students become acclimated to the environment. This is largely a review for experienced Cyber Range users. 2. Resources required
This exercise requires a Kali Linux VM running in the Cyber Range. 3. Initial Setup
For this exercise, you will log in to your Cyber Range account and select the Kali Linux with Metasploitable or Teach Cyber with Kali, then click “start” to start your environment and “join” to get to your Linux desktop. Choose “kali.com” if and when prompted.
4. Tasks
Task 1: Changing the terminal initial title working directory
Open a terminal and click Edit > Preferences…
© 2021 Cyber Range. Created by R. Eric Kiser. (CC BY-NC-SA 4.0)
Introduction to Information Security
Term: Spring 2023
The Terminal Preferences
dialog box will appear. To change the Initial title
, type your name in the title box. It is important to type your name, as the screenshots that will be turned in later in the course will rely on your name being in the terminal title. Check the “
Working directory
” box and change it to /home/student/Desktop
. Be sure to capitalize the D
. This will help with efficiency as we progress. You will not have to search for your files as they will appear on the desktop. Task 2: Changing the color scheme
Choose the Colors
tab in the Terminal Preferences. Here you can change the Text color
. Uncheck the Use system theme colors
box. I recommend “hacker green” because every great hacker wants to look like they are in the Matrix! I also happen to think it is easier on the eyes. Click on Close
at the bottom.
© 2021 Cyber Range. Created by R. Eric Kiser. (CC BY-NC-SA 4.0)
2
Introduction to Information Security
Term: Spring 2023
Task 3: User manual
Most Kali tools and commands have a usage manual. To access the manual, all you need to do is type man <tool>. Let’s try this with the ls
command. Type man ls
. The manual will be displayed with the tool usage. To exit out of the manual, press q
to quit. Task 4: Separating programs from the terminal
Oftentimes we will need to run programs directly from the terminal. Leafpad is a text editor like notepad. From the terminal, you can type leafpad <file you want to open>
. The issue with this is that you lose the function of your terminal window.
© 2021 Cyber Range. Created by R. Eric Kiser. (CC BY-NC-SA 4.0)
3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Introduction to Information Security
Term: Spring 2023
•
Type leafpad
and press enter.
•
Now return to the terminal and close out of it (Ctrl c). Notice Leafpad closes as well.
•
Adding “& disown” to this command will separate a GUI program from the terminal window.
•
Type leafpad & disown
. •
By using the “& disown” with a command, you should see that if you go back to the terminal window, you can now execute other commands. Try executing the ls command. If you close the terminal window, the Leafpad app will still run.
KSAs Addressed
From (https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf
)
Knowledge:
●
K0130:
Knowledge of virtualization technologies and virtual machine development and maintenance.
© 2021 Cyber Range. Created by R. Eric Kiser. (CC BY-NC-SA 4.0)
4
Introduction to Information Security
Term: Spring 2023
●
K0609
: Knowledge of virtual machine technologies
.
Skills:
●
S0073:
Skill in using virtual machines. (e.g., Microsoft Hyper-V, VMWare vSphere, Citrix XenDesktop/Server, Amazon Elastic Compute Cloud, etc.).
Abilities:
●
A0082
: Ability to effectively collaborate via virtual teams.
NSA/DHS CAE Knowledge Units: https://www.iad.gov/NIETP/documents/Requirements/CAE-
CD_2019_Knowledge_Units.pdf
(you may need to accept an invalid iag.gov SSL certificate to reach this PDF) ●
Basic Cyber Operations (BCO)
●
Penetration Testing (PTT)
© 2021 Cyber Range. Created by R. Eric Kiser. (CC BY-NC-SA 4.0)
5