Ability to determine the necessary confirmation

This preview shows page 12 - 17 out of 17 pages.

ability to determine the necessary confirmation request. Encrypting the remote control request of the system was highly probable as well. The employee did not employ a signal hiding wireless network at their home. Signal hiding is a configuration capability in most modern wireless access points. The access point’s user defined service set identifier, also known as the wireless network name, does not broadcast. It is recommend that home users enable this function in order to reduce malicious users seeking them out.
Project 2: Cybersecurity Incident Response 13 Wireless Traffic Analysis NGREP example: Figure 2 List all of the IP addresses found within this packet capture:
Project 2: Cybersecurity Incident Response 14 Figure 3 10.0.250.161 had the highest requests 10.0.250.200 had the highest requests to the webserver Figure 4
Project 2: Cybersecurity Incident Response 15 Figure 5 10.0.250.200 was reviewing for potential vulnerable WordPress capabilities to exploit Figure 6
Project 2: Cybersecurity Incident Response 16 The Meterpreter exploit was uploaded via the use of msfvenom. This allowed for remote control of the webserver. How can you modify the ngrep to include all IP addresses?
Figure 7
Project 2: Cybersecurity Incident Response 17 References Hutchins, E. M., Cloppert, M. J., & Amin, R. M. (n.d.). Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Lockheed Martin Corporation. Identity Theft . (2018, 11 01). Retrieved from Univerity of Maryland University College: MAC Spoofing . (2018, 11 01). Retrieved from University of Maryland University College: Preshared Keys . (2018, 10 27). Retrieved from University of Maryland University College: Ryan, C., & Lewis, J. M. (2017). Computer and Internet Use in the United States: 2015. U.S. Census Bureau. Scarfone, K., Dicoi, D., Sexton, M., & Tibbs, C. (2008). NIST Special Publication 800-48 - Guide to Securing Legacy IEEE 802.11 Wireless Networks. Gaithersburg: National Institute of Standards and Technology . Souppaya, M., & Scarfone, K. (2012). Guidelines for Securing Wireless Local Area Networks (WLANs). Gaithersburg: National Institute of Standards and Technology. Souppaya, M., & Scarfone, K. (2013). Guidelines for Managing the Security of Mobile Devices in the Enterprise. National Institute of Standards and Technology. Ssowmiya, B., & S, P. (2015). BYIntrusion Detection using Security Onion Based on Kill Chain Approach. International Journal of Science and Research (IJSR).

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture