Figure 13 IPCONFIG command ran in command prompt to display IP target PROJECT 1

Figure 13 ipconfig command ran in command prompt to

This preview shows page 11 - 18 out of 24 pages.

Figure 13. IPCONFIG command ran in command prompt to display IP target.
Image of page 11
PROJECT 1: PREPARATORY LAB EXERCISES 12 The Wireshark live scan was conducted on two systems. For this reason we must also get the IP address of the other targeted system. Figure 13a shows the results of IP address below. Figure 13a. Ping result in command prompt of second target. With the collected information from Figures 13 and 13a, Wireshark was launched. A new capture was conducted targeting Local Area Connection 2 and daaslab. While the capture was happening IP address 192.168.10.121 was pinged via the command prompt window. The Wireshark capture is shown below in Figure 14.
Image of page 12
PROJECT 1: PREPARATORY LAB EXERCISES 13 Figure 14. Wireshark capture as IP 192.168.10.121 is pinged. Two files were downloaded from the “WP Exploit” containing the desert.jpg image file. After the step above, the Wireshark capture was stopped and saved. A filter was in Wireshark to show the results of the capture containing IP 192.168.10.121 and http filter as shown in Figure 15 and 15a respectively. Figure 15. Wireshark filter for IP 192.168.10.121.
Image of page 13
PROJECT 1: PREPARATORY LAB EXERCISES 14 Figure 15a. Applying the http filter. To find the uploaded Desert.jpg file during the capture a new filter was applied. The filter applied was “http and tcp contains Desert.” This filter generated the results in Figure 16 below.
Image of page 14
PROJECT 1: PREPARATORY LAB EXERCISES 15 Figure 16. Results of applying the “http and tcp contains Desert” to find the uploaded Desert file. Snort Lab Report Snort is a program used as an intrusion detection system/intrusion protection system. Snort is used to monitor the network and computer connection for anomalies such as malware or other type of attacks. To start the Snort tool, the cyb670.pcap file was located as shown on Figure 17 below. Figure 17. Location of cyb670.pcap file.
Image of page 15
PROJECT 1: PREPARATORY LAB EXERCISES 16 After locating the file, a command prompt widow is opened and the command “ Snort –r C:\Snort\cyb670.pcap –P 5000 –c C:\snort\rules\cyb670.rules –e -X –v –l C:\Snort\log” is ran. Figure 18 below shows the results of this step. Figure 18. Results of running the Snort command to process the cyb670.pcap file. The file saved from the Wireshark Lab Report’s extension was changed to .pcap before running the command above. This same file will be saved as cyb670.rules and placed in the rules directory folder under the C:/Snort/Rules folder. The cyb670.rules file was opened and the “You finally made it work” message was typed. The command Snort –r C:\Snort\cyb670.pcap –P 5000 –c C:\snort\rules\cyb670.rules –e -X –v –l C:\Snort\log was ran again in the command prompt window. The alert.ids file was opened and the custom message was found as shown below in Figure 19.
Image of page 16
PROJECT 1: PREPARATORY LAB EXERCISES 17 Figure 19. Alert.ids file showing custom message.
Image of page 17
Image of page 18

You've reached the end of your free preview.

Want to read all 24 pages?

  • Spring '18

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture