Question: Materials Needed: Virtualization software ( e . g . , VirtualBox, VMware ) Virtual machines ( VMs ) with different operating systems ( e .
Materials Needed:
Virtualization software eg VirtualBox, VMware
Virtual machines VMs with different operating systems eg
Windows, Linux
A network traffic capture tool Wireshark or similar packet
capturing tool
A memory dump analysis tool.
Lab guide provided below
Set up two VMs one Windows and one Linux
Configure remote access on the both VMs through any
medium you choose.
Implement strong password policies on both VMs
Use Wireshark to capture network traffic between the two VMs
while attempting to login in using correct and incorrect
credentials. Once complete, close the capture and analytze it
for the packets that show the attempts, compare and contrast
the correct and incorrect attempts to access.
Open Wireshark for a second capture and Infect your VIRTUAL
MACHINES with malware of your choice. Have it run for a few
minutes, for the malware to fully take effect and then analyze
the capture for signs of attempted data exfiltration, login
attempts and other signs of attempts to gain unscrupulous
access
Procedure:
Set up two VMs one Windows and one Linux
Implement strong password policies on both VMs
Do some cursory research and utilize the builtin memory dump
tools or free thirdparty memory dump collection tools to create
a memory dump file.
Utilize a memory dump analysis tool and look for malicious
code and any other evidence of intrusions into either system.
This might require you to visit risky sites on the VM with the
security protocols off no antivirusmalware etc.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
