Question: Identify the traffic between your machine and the web machine: When did the interaction occur? What responses did the victim send back? What data

Identify the traffic between your machine and the web machine: When did

Identify the traffic between your machine and the web machine: When did the interaction occur? What responses did the victim send back? What data is concerning from the Blue Team perspective? 2. Find the request for the hidden directory. o In your attack, you found a secret folder. Let's look at that interaction between these two machines. How many requests were made to this directory? At what time and from which IP address(es)? Which files were requested? What information did they contain? What kind of alarm would you set to detect this behavior in the future? Identify at least one way to harden the vulnerable machine that would mitigate this attack. 3. Identify the brute force attack. o After identifying the hidden directory, you used Hydra to brute-force the target server. Answer the following questions: . Can you identify packets specifically from Hydra? How many requests were made in the brute-force attack? How many requests had the attacker made before discovering the correct password in this one? What kind of alarm would you set to detect this behavior in the future and at what threshold(s)? Identify at least one way to harden the vulnerable machine that would mitigate this attack. 4. Find the WebDav connection. 0 Use your dashboard to answer the following questions: . How many requests were made to this directory? Which file(s) were requested? What kind of alarm would you set to detect such access in the future? Identify at least one way to harden the vulnerable machine that would mitigate this attack. 5. Identify the reverse shell and meterpreter traffic. o To finish off the attack, you uploaded a PHP reverse shell and started a meterpreter shell session. Answer the following questions: . Can you identify traffic from the meterpreter session? What kinds of alarms would you set to detect this behavior in the future? Identify at least one way to harden the vulnerable machine that would mitigate this attack.

Step by Step Solution

3.33 Rating (156 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Identify the traffic between your machine and the web machine Determine the time of interaction resp... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!