Question: 1) Open the provided capture file using any SimSpace tools you see fit. As a minimum use Network Miner on any kali-Hunt VM and SNORT
1) Open the provided capture file using any SimSpace tools you see fit. As a minimum use Network Miner on any kali-Hunt VM and SNORT on any Win-Hunt VM.
2) Perform an analysis on the captured traffic. Some things you should consider are the following (not all of these happened and may not be all inclusive either): a. How long did the session capture last? b. How many packets were captured? c. How many bytes were captured? d. What protocols were observed? e. When did the bulk of the data get transmitted? f. What caused this transmission spike? g. Were any Internet Service Provider sites were accessed? If so which ones? What accounts? h. What is the name of the host computer? Its IP address? i. What Operating system is it using? j. What does the local network look like? k. What device names are on the local network? l. Did I access any other computers on the local area network? m. Are any other devices on the network?
3) What story does the capture file tell?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
