Question: Second Challenge: Post Network Security Analysis ( Attack - forensics ) : > Setup: Snort, Sguil, Squert and Wireshark. > Task 3 : analyze and
Second Challenge: Post Network Security Analysis Attack forensics:
Setup: Snort, Sguil, Squert and Wireshark.
Task: analyze and investigate all three PCAP files in a post processing mode using Squert and Wireshark, define the type of attack and perform detailed time series analysis of each attack.
checkmark Task : Investigate the provided pcap files containing traffic from a suspected
checkmark Task : Use Squert to detect any anomalies in the traffic captures.
Notes: You need to report and discuss the following:
Show all steps, commands and output screens.
Show how Snort, Squert and Wireshark is used to identify and investigate the attacks.
All triggered Snort alerts with description.
Perform a detailed time series analysis in Wireshark for the timeline of the attack. Assignment Deliverables:
Technical report of your work solving challenge and this report should describe all steps that you have done to solve this assignment with screen shots of your demonstration.
Discuss your work live during an online session with your lecturer.
Simulation Setup should be ready all times.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
