Question: 1 . Acquire 2 different operating systems ( various versions of Windows and the most recent version of Mac OSX are all available for free
Acquire different operating systems various versions of Windows and the most recent version of Mac OSX are all available for free Alternatively, there are many flavors of Linux Ubuntu Fedora, etc. which are available for download at no cost from their host sites on the Internet Acquire a Virtual Machine software. Download virtualbe for free. VMware is a popular software package, but is relatively expensive Install the OSs on two separate Virtual Machines. For now, do not install updates or patches Download omar, wireshark snort, and metasploit to each of the VMs Download some applications you commonly use on to the VMs Examples could include Skype, Limewire, Firefox, ICQ, Email clients, office suites, and games. On one of the hosts, you should install a DNS email, web, or some other common server. Free versions of all these servers exist BINDdibdos Apache, etcDo not limit yourself to these examples. These services may not be able to connect to the Internet in your current configuration, but at least make sure they are running: Take a snapshot of each VM so it carthe reverted to a known good state. You will have to checkyal'ce specific VM software as to how to do this, but it will save you a lot of trouble or redownloading everything later If you are not in the habit of backing up your data on the host computer, you should do that as well, just in case For the lab to work, both of the VMs must be on the same network. In parallels, this options is that they must both be on "hostonly networking." This generally requires that the VMs are then disconnected from the host computer's active outgoing Internet interface, so may require different settings than those that you needed to download the software tools For the following directions, I will just designate VM and VM as names for the two machines. It doesn't matter which one is first, and generally you will do each set of commands on each VM Disable any hostbased firewalls on VM and VM Start wireshark on VM On VM start nmap and scan the subnet the host is on You can use ipconfig Windows or ifconfig Unixlike to figure out the address of VM and its subnet. What did you find? What does the wireshark show on VM Is this surprising? Indicate any other surprises. Summarize the output of the two tools in sentences. Repeat, switching the rolls of VM and VM and make sure different programs and services are running than the previous scan Enable the firewall on one of the machines, and scan it again. Do the results change? How so Why? Start Snort of VM Now scan it from VM What happens? Explain why in a few sentences. Switch the roles of VM and VM and explain any differences Close Snort and disable the firewalls. Demonstrate an attack with Metasploit, and document it on the target machine with Wireshark. Be careful to indicate just the VM for the attack, do not attack your host machine! Clearly explain what you did and why, including where you got any information from the
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
