4.In Task 1.4, Step 2, what is the point, from a security standpoint? You already spoofed the computer. Why open /var/log/syslog? 5. In Task 3.2 Step 10 – Upload a screen shot showing your output in Network Miner on the Images tab. Yours make look different from this, but it should show the Security Onion symbol. Please make sure you show the Pod number.
NETLAB 3 6.Section 1.2 Analyze Telnet Connection. Step 1. What type of protocol is being analyzed with the multiple Wireshark captures? 7.Section 3.1 Using netcat to Send a Reverse Shell. What system are you logged in to receive a shell prompt from a remote system? 8. Section 3.1 Upload a screen shot generated from Step 12. Be sure to include your Pod Number . NETLAB 7 9.Section 2.3: If prompted for a password what do you enter? 10. Upload a screen shot resembling the output from Section 2.3 Task 16. AFTER you take the screen shot, you may want to end your reservation so the Ubuntu machine returns to its state before the lab.
11. This Pod uses various Linux machines – Kali, DVL, Ubuntu. In your own words, and after some research, describe the industry uses of Kali and DVL. Answer:
- Summer '18
- pod number