These labs represent skills and tasks that a network administrator will routinely perform. It is extremely important for a practitioner to have skills in these areas to inform security policy and procedures.
Review your worksheet and complete the subsequent labs:
Performing a Denial-of-Service Attack from the WAN
Implementing NAT and Allowing Remote Access
CYB 310 Module Three Lab Worksheet
Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information.
Lab: Performing a Denial-of-Service Attack From the WAN
Prompt
Response
In the lab section, “TCP Flood,” Step 11, include your name after the command prompt and take a screenshot of your name with the output from running the tcpdumpcommand.
[Insert screenshot here.]
In the lab section, “HTTP2 Flood,” Step 16, add your name at the command prompt after you run the capinfos HTTP2capture.cap command. Take a screenshot of your name and the output for the total number of packets captured in the number of packets data.
[Insert screenshot here.]
How can the Low Orbit Ion Cannon (LOIC) tool be used in the daily work an analyst would do?
[Insert short response here.]
What are two examples of information the LOIC tool could retrieve?
[Insert short response here.]
Lab: Implementing NAT and Allowing Remote Access
Prompt
Response
In the lab section, “Understanding NAT,”Step 27, take a screenshot of the display of the output from the ping command executed in Step 8.
[Insert screenshot here.]
In the lab section, “Secure Remote Login,”Step 34, take a screenshot of the VPN window after logging in to the network.
[Insert screenshot here.]
What useful information can be retrieved using NMAP and Wireshark together?
[Insert short response here.]
Why would it be important to map the network using tools, such as NMAP and Wireshark, prior to configuring NAT?