28.4.13 Lab – Incident Handling Answers

28.4.13 Lab – Incident Handling Answers Lab – Incident Handling (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Apply your knowledge of security incident handling procedures to formulate questions about given incident scenarios. Background / Scenario Computer security incident response has become a […]
Continue reading…

 

27.2.16 Lab – Investigating an Attack on a Windows Host Answers

27.2.16 Lab – Investigating an Attack on a Windows Host Answers Lab – Investigating an Attack on a Windows Host (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives In this lab you will: Part 1: Investigate the Attack with Sguil Part 2: Use […]
Continue reading…

 

27.2.15 Lab – Investigating a Malware Exploit Answers

27.2.15 Lab – Investigating a Malware Exploit Answers Lab – Investigating a Malware Exploit (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives In this lab you will: Part 1: Use Kibana to Learn About a Malware Exploit Part 2: Investigate the Exploit with […]
Continue reading…

 

27.2.14 Lab – Isolate Compromised Host Using 5-Tuple Answers

27.2.14 Lab – Isolate Compromised Host Using 5-Tuple Answers Lab – Isolate Compromised Host Using 5-Tuple (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives In this lab, you will review logs that were gathered during the exploitation of a documented vulnerability to determine […]
Continue reading…

 

27.2.12 Lab – Interpret HTTP and DNS Data to Isolate Threat Actor Answers

27.2.12 Lab – Interpret HTTP and DNS Data to Isolate Threat Actor Answers Lab – Interpret HTTP and DNS Data to Isolate Threat Actor (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives In this lab, you will review logs of an exploitation of […]
Continue reading…

 

27.2.10 Lab – Extract an Executable from a PCAP Answers

27.2.10 Lab – Extract an Executable from a PCAP Answers Lab – Extract an Executable from a PCAP (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Analyze Pre-Captured Logs and Traffic Captures Part 2: Extract Downloaded Files from PCAP Background / […]
Continue reading…

 

27.2.9 Lab – Regular Expression Tutorial Answers

27.2.9 Lab – Regular Expression Tutorial Answers Lab – Regular Expression Tutorial (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives In this lab, you will learn how to use regular expressions to search for desired strings of information. Part 1: Compete the regexone.com […]
Continue reading…

 

27.1.5 Lab – Convert Data into a Universal Format Answers

27.1.5 Lab – Convert Data into a Universal Format Answers Lab – Convert Data into a Universal Format (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Normalize Timestamps in a Log File Part 2: Normalize Timestamps in an Apache Log File […]
Continue reading…

 

26.1.7 Lab – Snort and Firewall Rules Answers

26.1.7 Lab – Snort and Firewall Rules Answers Lab – Snort and Firewall Rules (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Topology Objectives Part 1: Preparing the Virtual Environment Part 2: Firewall and IDS Logs Part 3: Terminate and Clear Mininet Process Background […]
Continue reading…

 

21.4.7 Lab – Certificate Authority Stores Answers

21.4.7 Lab – Certificate Authority Stores Answers Lab – Certificate Authority Stores (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Certificates Trusted by Your Browser Part 2: Checking for Man-In-Middle Background / Scenario As the web evolved, so did the need […]
Continue reading…

 

21.2.12 Lab – Examining Telnet and SSH in Wireshark Answers

21.2.12 Lab – Examining Telnet and SSH in Wireshark Answers Lab – Examining Telnet and SSH in Wireshark (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Examine a Telnet Session with Wireshark Part 2: Examine an SSH Session with Wireshark Background […]
Continue reading…

 

21.2.11 Lab – Encrypting and Decrypting Data Using a Hacker Tool Answers

21.2.11 Lab – Encrypting and Decrypting Data Using a Hacker Tool Answers Lab – Encrypting and Decrypting Data using a Hacker Tool (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Create and Encrypt Files Part 2: Recover Encrypted Zip File Passwords […]
Continue reading…

 

21.2.10 Lab – Encrypting and Decrypting Data Using OpenSSL Answers

21.2.10 Lab – Encrypting and Decrypting Data Using OpenSSL Answers Lab – Encrypting and Decrypting Data Using OpenSSL (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Encrypting Messages with OpenSSL Part 2: Decrypting Messages with OpenSSL Background / Scenario OpenSSL is […]
Continue reading…

 

21.1.6 Lab – Hashing Things Out Answers

21.1.6 Lab – Hashing Things Out Answers Lab – Hashing Things Out (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Hashing a Text File with OpenSSL Part 2: Verifying Hashes Background / Scenario Hash functions are mathematical algorithms designed to take […]
Continue reading…

 

21.0.3 Class Activity – Creating Codes Answers

21.0.3 Class Activity – Creating Codes Answers Class Activity – Creating Codes (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives In this lab, you will create and encrypt messages using online tools. Part 1: Search for an online encoding and decoding tool. Part […]
Continue reading…