Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Identify the traffic between your machine and the web machine: When did the interaction occur? What responses did the victim send back? What data
Identify the traffic between your machine and the web machine: When did the interaction occur? What responses did the victim send back? What data is concerning from the Blue Team perspective? 2. Find the request for the hidden directory. o In your attack, you found a secret folder. Let's look at that interaction between these two machines. How many requests were made to this directory? At what time and from which IP address(es)? Which files were requested? What information did they contain? What kind of alarm would you set to detect this behavior in the future? Identify at least one way to harden the vulnerable machine that would mitigate this attack. 3. Identify the brute force attack. o After identifying the hidden directory, you used Hydra to brute-force the target server. Answer the following questions: . Can you identify packets specifically from Hydra? How many requests were made in the brute-force attack? How many requests had the attacker made before discovering the correct password in this one? What kind of alarm would you set to detect this behavior in the future and at what threshold(s)? Identify at least one way to harden the vulnerable machine that would mitigate this attack. 4. Find the WebDav connection. 0 Use your dashboard to answer the following questions: . How many requests were made to this directory? Which file(s) were requested? What kind of alarm would you set to detect such access in the future? Identify at least one way to harden the vulnerable machine that would mitigate this attack. 5. Identify the reverse shell and meterpreter traffic. o To finish off the attack, you uploaded a PHP reverse shell and started a meterpreter shell session. Answer the following questions: . Can you identify traffic from the meterpreter session? What kinds of alarms would you set to detect this behavior in the future? Identify at least one way to harden the vulnerable machine that would mitigate this attack.
Step by Step Solution
★★★★★
3.33 Rating (156 Votes )
There are 3 Steps involved in it
Step: 1
Identify the traffic between your machine and the web machine Determine the time of interaction resp...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started