In Task 14 Step 2 what is the point from a security standpoint You already

In task 14 step 2 what is the point from a security

This preview shows page 2 - 5 out of 5 pages.

4.In Task 1.4, Step 2, what is the point, from a security standpoint? You already spoofed the computer. Why open /var/log/syslog? 5. In Task 3.2 Step 10 Upload a screen shot showing your output in Network Miner on the Images tab. Yours make look different from this, but it should show the Security Onion symbol. Please make sure you show the Pod number.
Image of page 2
Image of page 3
NETLAB 3 6.Section 1.2 Analyze Telnet Connection. Step 1. What type of protocol is being analyzed with the multiple Wireshark captures? 7.Section 3.1 Using netcat to Send a Reverse Shell. What system are you logged in to receive a shell prompt from a remote system? 8. Section 3.1 Upload a screen shot generated from Step 12. Be sure to include your Pod Number . NETLAB 7 9.Section 2.3: If prompted for a password what do you enter? 10. Upload a screen shot resembling the output from Section 2.3 Task 16. AFTER you take the screen shot, you may want to end your reservation so the Ubuntu machine returns to its state before the lab.
Image of page 4
11. This Pod uses various Linux machines Kali, DVL, Ubuntu. In your own words, and after some research, describe the industry uses of Kali and DVL. Answer:
Image of page 5

You've reached the end of your free preview.

Want to read all 5 pages?

  • Summer '18
  • pod number

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes