ECIHv3 Module 04 Handling and Responding to Malware Incident

pdf

School

Northern Kentucky University *

*We aren’t endorsed by this school

Course

484

Subject

Information Systems

Date

Oct 30, 2023

Type

pdf

Pages

2

Uploaded by fawb1

Report
EC-Council Report generated on : 03 Oct 2023 23:23 PM Player Details User BFaw Lab Id 7115076830874693892 Lab name ECIHv3 Module 04 Handling and Responding to Malware Incident Score 99 Possible score 99 Date played 03 Oct 2023 20:55 PM Flag Details Name Course Task Status Hints used Score In the Incident Response machine, use a remote desktop connection app to remotely investigate the security incident on the malware-infected machine “Marketing Deptâ€. Identify the IP address of the infected machine. ECIHv3 Scenario 1: Handling and Responding to Malware Security Incident Completed 0 10/10 In the Marketing Dept machine, perform dynamic analysis remotely from the Incident Response machine using the Process Monitor tool located at E:\ECIH-Tools\ECIHv3 Module 04 Handling and Responding to Malware Incidents\Malware Analysis Tools\Dynamic Malware Analysis Tools\Process Monitoring Tools\Process Monitor and identify the suspected malicious file running in the machine. ECIHv3 Scenario 1: Handling and Responding to Malware Security Incident Completed 0 10/10 Use the BinText tool located at E:\ECIH-Tools\ECIHv3 Module 04 Handling and Responding to Malware Incidents\Malware Analysis Tools\Static Malware Analysis Tools\String Searching Tools\BinText in the Marketing Dept machine to perform static malware analysis on the malicious file identified in the previous flag. (No answer is required. Write “skip†as the answer to skip this flag.) ECIHv3 Scenario 1: Handling and Responding to Malware Security Incident Completed 0 10/10 In the Marketing Dept machine, use the MalwareBytes tool located at E:\ECIH-Tools\ECIHv3 Module 04 Handling and Responding to Malware Incidents\Anti-Virus Software\MalwareBytes to scan the infected system and permanently delete the identified malicious file. Name the MalwareBytes option to remove the identified malicious files from the system. ECIHv3 Scenario 1: Handling and Responding to Malware Security Incident Completed 0 10/10 In the Operations Dept machine, launch the Wireshark tool and select the ethernet adapter to capture incoming and outgoing network traffic. (No answer is required. Write “skip†as the answer to skip this flag.) ECIHv3 Scenario 2: Handling and Responding to Ransomware Attack Completed 0 10/10 In the Operations Dept machine, use the ZoneAlarm tool located at C:\ECIH-Tools\ECIHv3 Module 04 Handling and Responding to Malware Incidents\ZoneAlarm FIREWALL to block the attacker's IP address from which the packets are coming to contain the security incident. Which among the ANTIVIRUS, FIREWALL, and MOBILITY options did you need to use to block the incoming traffic from the attacker’s machine? ECIHv3 Scenario 2: Handling and Responding to Ransomware Attack Completed 0 10/10 Use the Sales Dept machine to launch a ransomware attack using the Infection Monkey simulator on the target machine Operations Dept and encrypt the “Confidential Data†folder located at C:\Users\Administrator\Desktop. Identify the exploit used on the Exploits page to launch a ransomware attack on the target machine. (Note: Access the Infection Monkey simulator at https://10.10.10.17:5000 using credentials admin/password.) ECIHv3 Scenario 2: Handling and Responding to Ransomware Attack Completed 0 10/10 Open the Wireshark tool on the Operations Dept machine and observe a large number of packets that Wireshark is capturing. Identify the incoming packets from the attacker’s machine and note down its IP address. ECIHv3 Scenario 2: Handling and Responding to Ransomware Attack Completed 0 10/10 In the victim machine (Operations Dept), launch Server Manager and use the Windows Server Backup tool to recover “Confidential Data†folder from the remote Backup Server machine. (No answer is required. Write “skip†as the answer to skip this flag.) ECIHv3 Scenario 2: Handling and Responding to Ransomware Attack Completed 0 9/9
Assess the system's security against ransomware infections using the RanSim simulator located at C:\ECIH-Tools\ECIHv3 Module 04 Handling and Responding to Malware Incidents\Vulnerability Assessment\RanSim of the Operations Dept machine and find out the vulnerable ransomware attack scenarios. (No answer is required. Write “skip†as the answer to skip this flag.) ECIHv3 Scenario 2: Handling and Responding to Ransomware Attack Completed 0 10/10 Target Details Name Operating System ECIHv3 Sales Dept_M4 Windows ECIHv3 OSSIM Server Linux ECIHv3 pfSense Firewall Linux ECIHv3 Marketing Dept_M4 Windows ECIHv3 Operations Dept_M4 Windows ECIHv3 Backup Server Windows
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: It is important to recognize and address some of the challenges involved in creating an information…
Q: 7. Each function below describes how something changes. Use the descriptions to determine which…
Q: List the elements of each of the following sample spaces. Complete parts (a) through (d) below. (2…
Q: The Robert Baker Bread Company is planning to open a production plant to bake bread for sale and…
Q: A selected structural douglas fir-Larch 4*16 beam on a 20ft span support a hoist located at the…
Q: If the toggle shown is added to the tongs of Prob. 6.141 and the load is lifted by applying a single…
Q: A gene almost always codes for a ___________ and can be found at a specific place on a chromosome…
Q: A 47.0 kg stunt pilot who has been diving her airplane vertically pulls out of the dive by changing…
Q: PYTHON: The command 6 % 3 will give you: a. 2 b. 1 c. 2.0 The command abs(-4,4) will give you:…
Q: Draw the Lewis structure of C₂H₂Cl₂ (both Cl atoms on one C atom) and then determine if the molecule…
Q: 1. Find the solution of the given initial value problem. y" + 2y + 2y = 0, y(t) = -1, y'(T) = 0.…
Q: gas exert? a) The pressure due to the hydrogen was Submit Answer Tries 0/99 b) The pressure due to…
Q: You have dialysis tubing that is permeable to water but not sucrose that contain 10 mL of varying…
Q: contractor claims that the mean compressive strength for a concrete mix is 5000 psi (μ) and that it…
Q: For the development of an information system architecture to handle this new service, it is…
Q: The number of birth defects in a region is commonly modeled as having a binomial distribution, with…
Q: The role of CO2 as a greenhouse gas capable of affecting global temperatures: was first proposed by…
Q: You are designing a diving bell to withstand the pressure of seawater at a depth of 240 mm. 1.…
Q: 2. True or false: (-5)−4 = −5−4? Why?
Q: Solve using factoring by grouping:   12x^2+11x+2=0
Q: Liabilities are increased by
Q: Consider the following repeating decimal. 0.8 (a) Write the repeating decimal as a geometric series.…