Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Identify the traffic between your machine and the web machine: When did the interaction occur? What responses did the victim send back? What data

image text in transcribed

Identify the traffic between your machine and the web machine: When did the interaction occur? What responses did the victim send back? What data is concerning from the Blue Team perspective? 2. Find the request for the hidden directory. o In your attack, you found a secret folder. Let's look at that interaction between these two machines. How many requests were made to this directory? At what time and from which IP address(es)? Which files were requested? What information did they contain? What kind of alarm would you set to detect this behavior in the future? Identify at least one way to harden the vulnerable machine that would mitigate this attack. 3. Identify the brute force attack. o After identifying the hidden directory, you used Hydra to brute-force the target server. Answer the following questions: . Can you identify packets specifically from Hydra? How many requests were made in the brute-force attack? How many requests had the attacker made before discovering the correct password in this one? What kind of alarm would you set to detect this behavior in the future and at what threshold(s)? Identify at least one way to harden the vulnerable machine that would mitigate this attack. 4. Find the WebDav connection. 0 Use your dashboard to answer the following questions: . How many requests were made to this directory? Which file(s) were requested? What kind of alarm would you set to detect such access in the future? Identify at least one way to harden the vulnerable machine that would mitigate this attack. 5. Identify the reverse shell and meterpreter traffic. o To finish off the attack, you uploaded a PHP reverse shell and started a meterpreter shell session. Answer the following questions: . Can you identify traffic from the meterpreter session? What kinds of alarms would you set to detect this behavior in the future? Identify at least one way to harden the vulnerable machine that would mitigate this attack.

Step by Step Solution

3.33 Rating (156 Votes )

There are 3 Steps involved in it

Step: 1

Identify the traffic between your machine and the web machine Determine the time of interaction resp... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

College Physics

Authors: Raymond A. Serway, Jerry S. Faughn, Chris Vuille, Charles A. Bennett

7th Edition

9780534997236, 495113697, 534997236, 978-0495113690

More Books

Students also viewed these Accounting questions

Question

Can partitioned join be used for r r.A s? Explain your answer

Answered: 1 week ago