Lab Step

In: Computers and Technology

Submitted By Blood123
Words 3168
Pages 13
Hands-On Steps Note: This lab contains detailed lab procedures which you should follow as written. Frequently performed tasks are explained in the Common Lab Tasks document on the vWorkstation desktop. You should review these tasks before starting the lab. 1. From the vWorkstation desktop, open the Common Lab Tasks file. If desired, use the File Transfer button to transfer the file to your local computer and print a copy for your reference. Figure 1 "Student Landing" workstation 2. On your local computer, create the lab deliverable files. 3. Review the Lab Assessment Worksheet at the end of this lab. You will find answers to these questions as you proceed through the lab steps. Part 1: Capture Network Traffic using TCPdump utility Note: In the next steps, you will use TCPdump, a command line utility, to capture network traffic on the TargetLinux01 virtual server. You will generate that traffic by exploiting a cross-site scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA) tool. In the lab environment, you will be capturing traffic on one interface. In a real-world situation, it is likely the machine would be straddling both an internal network and an external network. In that case, you would want to want to monitor both sides of the interface. Monitoring outside network traffic allows information systems security practitioners to see who and what is attempting to infiltrate your IP network. Monitoring internal traffic allows network analysts to see exactly which hosts may be compromised and what destination IP addresses internal employees are accessing.

1. Double-click the RDP folder on the vWorkstation desktop to open the folder. 2. Double-click the TargetLinux01 file in the RDP folder to open a remote connection to the Linux machine. The remote desktop opens with the IP address of the remote machine (172.30.0.11) in the title bar at the…...

Similar Documents

Lab 1. What Are the Five Steps of a Hacking Attack?

...1 1. List the 5 steps of the hacking process. 1—Reconnaissance 2—Scanning 3—Gaining Access 4—Maintaining Access 5—Covering Tracks 2. In order to exploit or attack the targeted systems, what can you do as an intial first step to collect as much information as possible about the targets prior to devising and attack and penetration test plan? The first step I would take would be from the 5 steps to hacking which is the reconnaissance. I would use passive reconnaissance as this pertains to information gathering. 3. What applications and tools can be used to preform this initial reconnaissance and probinig step? Google is a major tool in most hackers initial first step. But you can use Nmap , AMAP, ScanRand and Paratrace. 4. How can social engineering be used to gather information or data about the organization’s IT infrastructure? Social Engineering is one of the number one ways a network is easily infiltrated. They major forms of this are Phishing, baiting and diversion theft. 5. What does the Enumeration step of the five (5) step hacking process entail and how is it vital to the hacker’s objective? Enumeration is the same as scanning a system for vulnerabilities that can be used to attack the system itself. This is vital to any hacker’s object since it reveals the information needed to access the target. 6. Explain how an attacker will avoid being detected following a successful penetration attack? To avoid detection a good hacker will...

Words: 752 - Pages: 4

Labs

...and Code of Conduct Preface LAB #1 ix vii Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Introduction Deliverables Hands-On Steps 1 1 3 14 15 2 Learning Objectives 1 Evaluation Criteria and Rubrics LAB #1 AssessmeNt WoRksheet LAB #2 Perform a Vulnerability Assessment scan Using Nessus Introduction Deliverables Hands-On Steps 19 19 21 31 32 20 Learning Objectives 19 Evaluation Criteria and Rubrics LAB #2 AssessmeNt WoRksheet LAB #3 enable Windows Active Directory and User Access Controls Introduction Deliverables Hands-On Steps 35 35 37 49 50 36 Learning Objectives 35 Evaluation Criteria and Rubrics LAB #3 AssessmeNt WoRksheet LAB #4 Configure Group Policy objects and microsoft® Baseline security Analyzer (mBsA) Introduction Deliverables Hands-On Steps 53 53 55 63 64 54 Learning Objectives 53 Evaluation Criteria and Rubrics LAB #4 AssessmeNt WoRksheet iii 38351_FMxx_Pass4.indd 3 23/04/13 5:13 AM iv Contents LAB #5 Perform Protocol Capture and Analysis Using Wireshark and NetWitness Investigator 67 Introduction Deliverables Hands-On Steps 67 67 69 80 81 68 Learning Objectives Evaluation Criteria and Rubrics LAB #5 AssessmeNt WoRksheet LAB #6 Perform Business Continuity Implementation Planning Introduction Deliverables Hands-On Steps 85 85 86 87 90 91 Learning Objectives and Outcomes 85 Evaluation Criteria and Rubrics LAB #6 AssessmeNt WoRksheet LAB #7 Relate Windows......

Words: 26285 - Pages: 106

Lab 1. What Are the Five Steps of a Hacking Attack?

...Lab 1. What Are the Five Steps of a Hacking Attack? 1 1. List the 5 steps of the hacking process. 1—Reconnaissance 2—Scanning 3—Gaining Access 4—Maintaining Access 5—Covering Tracks 2. In order to exploit or attack the targeted systems, what can you do as an intial first step to collect as much information as possible about the targets prior to devising and attack and penetration test plan? The first step I would take would be from the 5 steps to hacking which is the reconnaissance. I would use passive reconnaissance as this pertains to information gathering. 3. What applications and tools can be used to preform this initial reconnaissance and probinig step? Google is a major tool in most hackers initial first step. But you can use Nmap , AMAP, ScanRand and Paratrace. 4. How can social engineering be used to gather information or data about the organization’s IT infrastructure? Social Engineering is one of the number one ways a network is easily infiltrated. They major forms of this are Phishing, baiting and diversion theft. 5. What does the Enumeration step of the five (5) step hacking process entail and how is it vital to the hacker’s objective? Enumeration is the same as scanning a system for vulnerabilities that can be used to attack the system itself. This is vital to any hacker’s object since it reveals the information needed to access the target. 6. Explain how an attacker will avoid being detected following a successful penetration...

Words: 347 - Pages: 2

Archicad Step by Step

...Contents Contents Step by Step Tutorial by Thomas M. Simmons 1ArchiCAD Step by Step Tutorial ArchiCAD Step by Step Tutorial1 Contents Graphisoft Visit the Graphisoft website at http://www.graphisoft.com for local distributor and product availability information. Graphisoft ArchiCAD Step by Step Tutorial Copyright © 1998-2003 by Thomas M. Simmons. All rights reserved. Reproduction, paraphrasing or translation without express prior written permission of the author and Graphisoft is strictly prohibited. Published by GRAPHISOFT R&D Rt. Second edition - first printing. Trademarks ArchiCAD and ArchiFM are registered trademarks and PlotMaker, Virtual Building, StairMaker and GDL are trademarks of Graphisoft. All other trademarks are the property of their respective holders. 2 ArchiCAD Step by Step Tutorial Contents Contents About the Author Thomas M. Simmons President ARCHVISTA The Graphisoft ArchiCAD Step by Step Tutorial was developed by ARCHVISTA and used with the ArchiCAD training course at the San Francisco Institute of Architects. This is the first edition of Step by Step produced for ArchiCAD 8. The author, Thomas M. Simmons, spent seven years as an architect and served as the Director of Design Technology for Esherick, Homsey, Dodge and Davis Architects, an award-winning and internationally acclaimed architecture firm, before starting his company, ARCHVISTA. While at EHDD Architects, he was instrumental in integrating and managing......

Words: 31008 - Pages: 125

Lab#1 Assesment Hands-on Steps

...Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Introduction Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you will plan an attack on 172.30.0.0/24 where the VM server farm resides, and use the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. LAB 1 Learning Objectives Upon completing this lab, you will be able to: • Access the virtual machines (server farm and workstations) needed for the labs in this course • Use the vWorkstation to connect to the applications and virtual machines needed for this lab • Plan an initial reconnaissance and probing attack on the Virtual Security Cloud Lab (VSCL) • Use Zenmap GUI (Nmap) to perform an “Intense Scan” on the entire targeted VSCL infrastructure (172.30.0.0/24) • Generate a Zenmap GUI (Nmap) port scanning report and submit it as part of the deliverables for this lab Tools and sofTware Name FileZilla Server and FileZilla Client Nessus NetWitness Investigator PuTTY Tftpd32 Wireshark Zenmap GUI more INformatIoN http://filezilla-project.org/ http://www.nessus.org/products/nessus http://www.emc.com/security/rsa-netwitness.htm......

Words: 2926 - Pages: 12

Step

...can see, such as language, behavior, food and dressing, 90 percent of which is what you cannot see, such as beliefs, values, and ways of thinking,”(Hasan et. al, 2012, p. 4). The culture of a corporation relates to the “unique modes of carrying out their activities,” (Dartey, 2013, p. 39). Forces in the external environment constantly demand companies to assess their organizational environment. The field of business is always changing and it is important for companies to continually evolve. With economic globalization it is necessary for each corporation to adapt to change and interpret event that occur in the environment. Managers, HR professionals, and employees contribute to the success of their organization. When businesses decide to step into the international market they have to face some challenges. Regardless of where in the world the business is expanded, human resources professionals have to collaborate with local professionals to attend to changes within the corporation and adjust the HRM system. The purpose of this paper is to analyze the role of HRM cross culturally and how cultural issues are resolved. National cultures influence strategic decisions and leadership styles “as well as human resource management practice such as performance appraisal,” (Dartey, 2013, p. 40). Studies have shown that in cultures where high power distance exists, “loyalty and obedience to those in higher authority is required,” (Darte, 2013, p. 40). So management makes use of......

Words: 380 - Pages: 2

Step by Wicked Step

...I choose the novel Step by Wicked Step written by Anne Fine. The memorable event from the novel is the honest conversation between Pixie and her stepmother Lucy. I think that the conversation is important because it affects Pixie's life. First of all, I think that the conversation is important because Pixie has a chance to tell the truth about her feelings. Pixie tells Lucy that she hates to pretend that their family is normal. It is hard for her to accept strangers as family. She dislikes her stepsisters. When Hetty moves into Pixie's bedroom after quarreling with Sophie, Pixie is very angry. She tries many ways to get rid of Hetty. Apart from that, I think that the conversation between Lucy and Pixie is important because Lucy also gets a chance to express her feelings towards Pixie. Lucy hates being a step mother. It is very hard for her to take care of someone else's child. Lucy is angry when Pixie when Pixie tries to get rid of Hetty from her bedroom. Last but not least, I think the heart to heart conversation is memorable because it improves the relationship between Pixie and Lucy. They understand each other better. at the end of the conversation, they are crying and hugging each other. After that day, their relationship becomes better and they are more like a normal family. In a nutshell, I think that the honest conversation between Lucy and Pixie is memorable because it improves the relationship between Pixie and her step family. I learn many things from......

Words: 519 - Pages: 3

Essay Writing Step by Step

...ESSAY WRITING STEP BY STEP “Write an essay? But I don’t know how!” If you are unnerved by the thought of writing a college essay, remember that this task can be accomplished in the same way as any other—one step at a time. An effective essay is the result of careful thinking, planning, writing, and revising. If you work hard on the first two steps, the last two will be much easier. Your goal is to produce an essay whose content is focused, well-developed, and clear. THINKING (Many decisions must be made before you actually write anything down.) 1. Consider purpose: The general purpose of your essay will usually be determined by your instructor. To be sure you know the specific purpose of your particular essay, complete this sentence: “The purpose of my essay is to ….” Example: General Purpose: Describe in detail an important characteristic of a person you know well. Specific purpose: The purpose of my essay is to describe my mother’s kindness toward her family, friends, and co-workers. 2. Consider audience: The identity of your audience will determine how much background information will be necessary and what terms need to be used or defined. For example, an essay written for nurses on care of the elderly will include less background and more technical information than an essay written for the general public on the same topic. Unless directed otherwise, you should write for an uninformed audience. Even if your...

Words: 1739 - Pages: 7

Step by Wicked Step

...ENGLISH – STEP BY WICKED STEP SAMPLE QUESTIONS AND ANSWERS 1. Choose one character that you like and give your reasons why you like the character.  From the novel 'Step By Wicked Step' by Anne Fine, I like Claudia from the story the Green Pyjamas. I like Claudia because she is kind, loyal and she can be very mature and wise.      Claudia is a very kind girl.  During her father's birthday party, Claudia wears her green pyjamas given by her father's girlfriend, Stella. She decides to do this because she feels that the guests in the party are very rude when they refuse to talk to Stella. They act like Stella is invisible and Claudia feels angry because Stella is actually a very nice person.      Other than that, Claudia is also a loyal daughter to her mother.She knows that her mother hates the fact that her father is happy with a new woman in his life so she pretends that she is unhappy when she has to go to her father's house. Claudia also refuses to accept Stella's kindness because she wants to show that she is loyal to her mother.      Lastly, Claudia shows that she is very mature and wise. Claudia feels that the guests for her father's birthday party are very rude. They do not want to acknowledge that Stella is her father's new love by giving her a cold shoulder during the party. Claudia is very angry with all those immature adults so she decides to give all of them a lesson by wearing her new green pyjamas and showing it off in front of the guess, hinting......

Words: 1965 - Pages: 8

Labs

...Tissues The Integumentary System 35 43 The Cell: Transport Mechanisms and Permeability–Wet Lab Classification of Covering and Lining Membranes 49 Overview of the Skeleton: Classification and Structure of Bones and Cartilages 53 The Axial Skeleton The Fetal Skeleton 59 67 81 87 93 103 77 The Appendicular Skeleton Articulations and Body Movements Microscopic Anatomy and Organization of Skeletal Muscle Gross Anatomy of the Muscular System Histology of Nervous Tissue 113 119 125 Exercise 16A Skeletal Muscle Physiology: Frogs and Human Subjects Exercise 18A Neurophysiology of Nerve Impulses: Wet Lab Gross Anatomy of the Brain and Cranial Nerves Electroencephalography Human Reflex Physiology General Sensation 153 157 167 177 173 Special Senses: Vision 133 Spinal Cord, Spinal Nerves, and the Autonomic Nervous System 145 137 Special Senses: Hearing and Equilibrium Special Senses: Olfaction and Taste Functional Anatomy of the Endocrine Glands iii Exercise 28A Role of Thyroid Hormone, Pituitary Hormone, Insulin, and Epinephrine: Wet Lab 183 Exercise 29A Blood Exercise 30 Exercise 31 Exercise 32 189 199 205 209 Anatomy of the Heart Conduction System of the Heart and Electrocardiography Anatomy of Blood Vessels Exercise 33A Human Cardiovascular Physiology: Blood Pressure and Pulse Determinations 217 Exercise 34A Frog Cardiovascular Physiology: Wet Lab Exercise 36 Exercise 38 Exercise 40 Exercise 42 Exercise 43 Exercise 44 Exercise 45 Exercise......

Words: 120457 - Pages: 482

Labs

...© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones Bartlett Lab #2© Jones &SALE ORLearning, LLC Vulnerabilities to &SALE ORLearning, LL AligningBartlett DISTRIBUTION Risks, Threats, and NOT FOR DISTRIBUT NOT FOR COBIT P09 Risk Management Controls © Jones & Bartlett Learning, LLC Introduction © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, © Jones & Bartlett Learning, LLC first released in 1996.Jones & Bartlett Learning, LLC © ISACA is an IT professionals’ association centered on auditing and IT governance. This NOT FOR SALE OR DISTRIBUTION The lab lab will focus on the COBIT framework. NOT FOR SALE OR DISTRIBUTION uses the latest two versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which is the latest version released in June 2012. Because COBIT 4.1 is freely available at the time of this writing, the lab uses this version to © Jones & Bartlett Presentation is done making use of a © Jones & Bartlett Learning, LL present handling of risk management. Learning, LLC set of COBIT......

Words: 2487 - Pages: 10

Ten Steps to a Me Steps

...A Handbook for Development Practitioners Ten Steps to a 29672 ResultsBased Monitoring and Evaluation System Jody Zall Kusek Ray C. Rist THE WORLD BANK A Handbook for Development Practitioners Ten Steps to a Results-Based Monitoring and Evaluation System A Handbook for Development Practitioners Ten Steps to a Results-Based Monitoring and Evaluation System Jody Zall Kusek Ray C. Rist THE WORLD BANK Washington, D.C. © 2004 The International Bank for Reconstruction and Development / The World Bank 1818 H Street, NW Washington, DC 20433 Telephone 202-473-1000 Internet www.worldbank.org E-mail feedback@worldbank.org All rights reserved. 1 2 3 4 07 06 05 04 The findings, interpretations, and conclusions expressed herein are those of the author(s) and do not necessarily reflect the views of the Board of Executive Directors of the World Bank or the governments they represent. The World Bank does not guarantee the accuracy of the data included in this work. The boundaries, colors, denominations, and other information shown on any map in this work do not imply any judgment on the part of the World Bank concerning the legal status of any territory or the endorsement or acceptance of such boundaries. Rights and Permissions The material in this work is copyrighted. Copying and/or transmitting portions or all of this work without permission may be a violation of applicable law. The World Bank encourages......

Words: 91537 - Pages: 367

Stats P7 Step by Step Solution

...STATS P7 STEP BY STEP Solution Click Link Below To Buy: http://hwcampus.com/shop/stats-p7-step-step-solution/ 1. A balanced coin is tossed 8 times. Let X denotes the number of heads. Calculate the following: / ‘n Gebalanseerde muntstuk word 8 keer gewerp. Laat X die aantal munte aandui. Bereken die volgende: 1.1 P(X = 5) 1.2 P(X 2) 1.3 P(X > 2) 2. Given/Gegee: Z ~ N ( 0 , 1); Calculate: / Bereken: 2.1 P(- 2.58 < Z < 2.52) 2.2 The value of k in. / Die waarde van k in. P(Z < k) = 0.9881 2.3 P(- 2.18 < Z < -1.82) 2.4 The value of k in. / Die waarde van k in. P(Z > k) = 0.9616 2.5 2.6 2.7 2.8 Find k 2.9 . Find k 2.10 . Find k 2.11 The value of k in : / Die waarde van k in: P(Z > k) = 0.0392 2.12 find / bepaal k 2.13 find k 2.14 find / bepaal a 2.15 The value of k in: / Die waarde van k in: P( Z > k) = 0.9887 2.16 The value of k in: / Die waarde van k in: P( Z < k) = 0.9394 2.17 The value of k in : / Die waarde van k in: P( Z > k) = 0.0823 2.18 The value of k in: / Die waarde van k in: P( Z < k) = 0.0618 3. A luxury passenger liner has 500 passengers on board whose ages are normally distributed around a mean of 60 years with a standard deviation of 12 years. / ’n Luukse passasierskip het 500 passasiers aan boord. Hul ouderdomme word normal verdeel om ‘n gemiddelde van 60 Jaar heen, met ‘n standaardafwyking van 12 jaar. 3.1 How many of the passengers are...

Words: 725 - Pages: 3

Stats P7 Step by Step Solution

...STATS P7 STEP BY STEP Solution Click Link Below To Buy: http://hwcampus.com/shop/stats-p7-step-step-solution/ 1. A balanced coin is tossed 8 times. Let X denotes the number of heads. Calculate the following: / ‘n Gebalanseerde muntstuk word 8 keer gewerp. Laat X die aantal munte aandui. Bereken die volgende: 1.1 P(X = 5) 1.2 P(X 2) 1.3 P(X > 2) 2. Given/Gegee: Z ~ N ( 0 , 1); Calculate: / Bereken: 2.1 P(- 2.58 < Z < 2.52) 2.2 The value of k in. / Die waarde van k in. P(Z < k) = 0.9881 2.3 P(- 2.18 < Z < -1.82) 2.4 The value of k in. / Die waarde van k in. P(Z > k) = 0.9616 2.5 2.6 2.7 2.8 Find k 2.9 . Find k 2.10 . Find k 2.11 The value of k in : / Die waarde van k in: P(Z > k) = 0.0392 2.12 find / bepaal k 2.13 find k 2.14 find / bepaal a 2.15 The value of k in: / Die waarde van k in: P( Z > k) = 0.9887 2.16 The value of k in: / Die waarde van k in: P( Z < k) = 0.9394 2.17 The value of k in : / Die waarde van k in: P( Z > k) = 0.0823 2.18 The value of k in: / Die waarde van k in: P( Z < k) = 0.0618 3. A luxury passenger liner has 500 passengers on board whose ages are normally distributed around a mean of 60 years with a standard deviation of 12 years. / ’n Luukse passasierskip het 500 passasiers aan boord. Hul ouderdomme word normal verdeel om ‘n gemiddelde van 60 Jaar heen, met ‘n standaardafwyking van 12 jaar. 3.1 How many of the passengers are...

Words: 725 - Pages: 3

Moral Value Step by Wicked Step

... choose the novel Step by Wicked Step written by Anne Fine. The most important moral value that I have learnt from this novel is honesty. There are many examples which show the importance of honesty throughout this novel. First of all, we can see that in this novel, parents are not being honest to their children. They do not tell their children what is happening between them. This causes the children a lot of stress and worry. For example, Lilith Harwick does not tell her children that their father is dying. We see how distressed Richard is when guessing the truth about his father's condition. When Colin's mother decides to leave Colin's dad and move up north, she does not explain the reason to Colin. Colin does not like his new life and misses his dad a lot, but his mother does not seem to be aware of how he felt. Apart from that, the parents' lack of honesty makes the children keep their thoughts and feelings to themselves. This is bad because it may cause the children to take the wrong action. For example, Colin stops talking about his dad to his mother, but plans to run away to find him one day. However, when parents are honest about their feelings and open up to their children, their relationship will get better. This can be seen in the case of Lucy and Pixie. After they burst out and tell each other their true feelings, their relationship improves a lot. Pixie respects Lucy and Lucy gives Pixie time and space to adapt to her new family. In a nutshell, honesty......

Words: 326 - Pages: 2

Fotografía analógica | Navy SEALs Americas Secret Warriors - Season 2 | Make Us Dream 2018 1080p AMZN WEB-DL DDP5 1 H 264-NTG