1) Successfully login to the SimSpace Portal: https://portal.simspace.com. 2)Aft

    1) Successfully login to the SimSpace Portal: https://portal.simspace.com.
    2)After login you may reference the SimSpace User Guide: https://portal.simspace.com/docs/index.html
    3) Under the Range application, successfully log into a Win-Hunt-XXX virtual machine (in the Cyber Tools area) and explore the VM a. Open a terminal window (DOS prompt/Command Prompt) b. Determine your IP address by entering the command: ipconfig c. Record the IP address for use below d. Start Wireshark on the network interface e. Leave the VM running
    4) Under the Range application, log into a Kali-Hunt-XXX virtual machine (in the Cyber Tools area)
    5) Explore the Kali VM to see what applications are hosted on the Kali-Hunt VM
    6) Determine what network connection(s) you can see a. Open a terminal window b. Determine your IP address (ifconfig)
    7) Start a continuous ICMP stream from the Kali-Hunt-XXX VM to the Windows-Hunt-XXX VM
    8) Do you see the ICMP stream from the Kali VM in Wireshark?
    9) Ensure you can capture the ICMP packets leaving the Kali VM—save that file as ICMP_Stream_PCAP
    10) Survey the tools on Kali-Hunt and Windows-Hunt. Identify at least six tools you think will be useful for intrusion detection and incident response. You can use the GUIs but you may also want to become familiar with using commands from the terminal windows since many security practitioners use command line interface tools
    11) Load the ICMP_Stream_PCAP into Wireshark then Network Miner, and report on any obvious incidents
    12) Provide a four-page lab report that shows you successfully executed the steps above and explains which tools you selected and why you believe they will be useful for incident detection and response.
    submit four-page, professional report, four single-spaced pages in length (font type Calibri and font size 12).
    All of your referenced screen shots proving your lab work and supporting material will appear in the appendix. All references will be properly cited throughout the report.

    Leave a Reply

    Your email address will not be published. Required fields are marked *