Lab Learning Goals This lab is a challenge to develop your traffic analysis skills. Using the provided pcap file, prepar

Business, Finance, Economics, Accounting, Operations Management, Computer Science, Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Algebra, Precalculus, Statistics and Probabilty, Advanced Math, Physics, Chemistry, Biology, Nursing, Psychology, Certifications, Tests, Prep, and more.
Post Reply
answerhappygod
Site Admin
Posts: 899603
Joined: Mon Aug 02, 2021 8:13 am

Lab Learning Goals This lab is a challenge to develop your traffic analysis skills. Using the provided pcap file, prepar

Post by answerhappygod »

Lab Learning Goals This Lab Is A Challenge To Develop Your Traffic Analysis Skills Using The Provided Pcap File Prepar 1
Lab Learning Goals This Lab Is A Challenge To Develop Your Traffic Analysis Skills Using The Provided Pcap File Prepar 1 (42.83 KiB) Viewed 45 times
Lab Learning Goals This lab is a challenge to develop your traffic analysis skills. Using the provided pcap file, prepar answers to the question contained in the lab. Required Resources • Wireshark 3.2.x (on your laptop) Submission Instructions . Complete the lab quiz: Lab 5-Traffic Analysis Lab Scenario You are a security analyst for Fanco Inc. working the night shift. At 11:35 PM on Tuesday nigh IDS system alerted you to a potential network attack. It looks as if the intruder is conducting a scanning attack on sections of the network. Some of the hosts in that network segment are rum legacy systems that have been scheduled for replacement but may still be vulnerable to attack decide to look at the trace files logged on the network sensor to get a better understanding of w occurring. The intruder, who accessed the system remotely and pivoted through a compromised server, aware that network security monitoring was in place. The organization captures full content da the network segment that the attack occurred on. Use the Lab 5.pcap file, answer the followin questions: 1. What is the IP address of the compromised host? 2. What type of port scan did the attacker conduct first? 3. Identify the hosts that responded to the attacker with open ports. 4. What is the MAC address of the Apple device that was discovered? 5. What is the IP address of the Windows device that was discovered? 6. What TCP ports are exposed on the Windows system? INFO-6081-Monitoring & Incident Response
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!
Post Reply