Question: 1 . Acquire 2 different operating systems ( various versions of Windows and the most recent version of Mac OSX are all available for free

1. Acquire 2 different operating systems (various versions of Windows and the most recent version of Mac OSX are all available for free). Alternatively, there are many flavors of Linux (Ubuntu, Fedora, etc.) which are available for download at no cost from their host sites on the Internet.2. Acquire a Virtual Machine software. Download virtualbe for free. VMware is a popular software package, but is relatively expensive.3. Install the 2 OSs on two separate Virtual Machines. For now, do not install updates or patches.4. Download omar, wireshark snort, and metasploit to each of the VMs5. Download some applications you commonly use on to the VMs. Examples could include Skype, Limewire, Firefox, ICQ, E-mail clients, office suites, and games. On one of the hosts, you should install a DNS, email, web, or some other common server. Free versions of all these servers exist (BIND/dibdos, Apache, etc).-Do not limit yourself to these examples. These services may not be able to connect to the Internet in your current configuration, but at least make sure they are running.6: Take a snapshot of each VM so it carthe reverted to a known good state. You will have to checkyal'ce specific VM software as to how to do this, but it will save you a lot of trouble or re-downloading everything later.7. If you are not in the habit of backing up your data on the host computer, you should do that as well, just in case.8. For the lab to work, both of the VMs must be on the same network. In parallels, this options is that they must both be on "host-only networking." This generally requires that the VMs are then disconnected from the host computer's active outgoing Internet interface, so may require different settings than those that you needed to download the software tools.9. For the following directions, I will just designate VM1 and VM2 as names for the two machines. It doesn't matter which one is first, and generally you will do each set of commands on each VM.10. Disable any host-based firewalls on VM1 and VM2.11. Start wireshark on VM2. On VM1, start nmap and scan the subnet the host is on. You can use ipconfig (Windows) or ifconfig (Unix-like) to figure out the address of VM1 and its subnet. What did you find? What does the wireshark show on VM2? Is this surprising? Indicate any other surprises. Summarize the output of the two tools in 2-3 sentences. Repeat, switching the rolls of VM1 and VM2, and make sure different programs and services are running than the previous scan.12. Enable the firewall on one of the machines, and scan it again. Do the results change? How so? Why?13. Start Snort of VM2. Now scan it from VM1. What happens? Explain why in a few sentences. Switch the roles of VM1 and VM2, and explain any differences.14. Close Snort and disable the firewalls. Demonstrate an attack with Metasploit, and document it on the target machine with Wireshark. Be careful to indicate just the VM for the attack, do not attack your host machine! Clearly explain what you did and why, including where you got any information from the

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!