Language:EN
Pages: 9
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
what the domain name that delivered the exploit ki

What the domain name that delivered the exploit kit and malware payload

Skills Assessment

900-81018V01 Statement of Attainment CCNA Cybersecurity Operations

Student details

•I understand that plagiarism is the presentation of the work, idea or creation of another person as though it is your own. Plagiarism occurs when the origin of the material used is not appropriately cited. No part of this assessment is plagiarised.

Student signature and Date

Document title: Unit Code_AE_Sk_1of2_20181015 Page 1 of 9

SkillsPoint
Location

© 2019 TAFE NSW, Sydney
RTO Provider Number 90003 | CRICOS Provider Code: 00591E
This assessment can be found in the:
The contents in this document is copyright © TAFE NSW 2019, and should not be reproduced without the permission of the TAFE NSW. Information contained in this document is correct at time of printing: 26 November 2019. For current information please refer to our website or your teacher as appropriate.

Assessment details

Instructions

Assessment overview

This is a skills based assessment and will be assessing you on your ability to demonstrate skills required in the unit.

This assessment has four parts:
1.Gathering basic information
2.Learn about the exploits
3.Determining the source of the malware 4.Analyse details of the exploit
5.Assessment Feedback

Submission instructions

To successfully complete this assessment the student will be available at the arranged time to complete all the assessment criteria as outlined in the assessment instructions.

All parts of the observable task must be performed to a satisfactory level as indicated in the criteria section of the Observation Checklist.

Document title: Unit Code_AE_Sk_1of2_20181015 Page 3 of 9
Assessment details

What do I need?

securityOnion-sba.ova:
https://share.tafensw.edu.au/share/file/bb68d6e7-ca36-4fb6-9c89-40021fa39bb7/1/SecurityOnion_%5BSBA%5D.ova

Due date/time allowed/venue

Appeals are addressed in accordance with Every Students Guide to Assessment.

Skills Assessment

You will practice and be assessed on the following skills:

o Evaluating Snort/SGUIL events.

The following addresses are preconfigured on the network devices. Addresses are provided for reference purposes.

Device Interface Network/Address Description
Security Onion VM

eth0

Interface connected to the External Networks/Internet

Part 1: Gathering Basic Information

c. When the nsm service is ready, log into SGUIL with the username analyst and password cyberops. Click Select All to monitor all the networks. Click Start SQUIL to continue.

___________________________________________________________________________

___________________________________________________________________________

h. What are some of the signature IDs of the rules that fire when the exploit occurs? Where are the Signature IDs from? Include screenshot.

___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________

i.
j.

Part 2: Learn About the Exploit

a. According to Snort, what is the exploit kit (EK) in use? Include screenshot

b. What is an exploit kit?

___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________

___________________________________________________________________________ ___________________________________________________________________________

e. What are the major stages in exploit kits?

Part 3: Determining the Source of the Malware

a. In the context of the events displayed by SGUIL for this exploit, record below the IP addresses involved.

Resource ID: STUDENT NAME:

___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________

f. Based on the SGUIL events, what vulnerability seems to have been used by the exploit kit?

Were you able to find more evidence? If so, record your findings here. Include screenshot

___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________

i.

Document title: Unit Code_AE_Sk_1of2_20181015 Page 7 of 9

Resource ID: STUDENT NAME:

___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________

b. What is the domain name that delivered the exploit kit and malware payload?

___________________________________________________________________________________

___________________________________________________________________________________

Document title: Unit Code_AE_Sk_1of2_20181015 Page 8 of 9

Resource ID: STUDENT NAME:

☐ If no, was the resubmission/re-assessment successfully completed?

☐ Was reasonable adjustment in place for this assessment event? If yes, ensure it is detailed on the assessment document.

Student name, signature and date

NOTE: Make sure you have written your name at the bottom of each page of your submission before attaching the cover sheet and submitting to your assessor for marking.

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Gautami Mishra

PageId: DOC44C690D