(Answers) 9.1.1.6 Lab – Encrypting and Decrypting Data Using OpenSSL (Instructor Version)
Objectives
Part 1: Encrypting Messages with OpenSSL
Part 2: Decrypting Messages with OpenSSL
Background / Scenario
OpenSSL is an open source project that provides a robust,…
(Answers) 7.1.2.7 Packet Tracer – Logging Network Activity
Topology
Addressing Table
Device
Private IP Address
Public IP Address
FTP_Server
192.168.30.253
209.165.200.227
SYSLOG_SERVER
192.168.11.254
209.165.200.229
Router2
N/A…
(Answers) 7.3.2.5 Lab – Reading Server Logs (Instructor Version)
Objectives
Part 1: Reading Log Files with Cat, More, and Less
Part 2: Log Files and Syslog
Part 3: Log Files and Journalctl
Background / Scenario
Log files are an important…
(Answers) 7.3.2.4 Lab – Attacking a mySQL Database (Instructor Version)
Objectives
In this lab, you will view a PCAP file from a previous attack against a SQL database.
Background / Scenario
SQL injection attacks allow malicious hackers to type SQL…
(Answers) 7.3.1.6 Lab – Exploring DNS Traffic (Instructor Version)
Objectives
Part 1: Capture DNS Traffic
Part 2: Explore DNS Query Traffic
Part 3: Explore DNS Response Traffic
Background / Scenario
Wireshark is an open source packet…
(Answers) 7.0.1.2 Class Activity – What's Going On (Instructor Version)
Objectives
Identify the processes running on a computer, the protocol they are using, and their local and remote port addresses.
Background / Scenario
For a hacker to establish a…
(Answers) 6.2.2.9 Lab – Social Engineering (Instructor Version)
Objectives
Research and identify social engineering attacks
Background / Scenario
Social engineering is an attack with the goal of getting a victim to enter personal or sensitive…
(Answers) 6.2.1.11 Lab – Anatomy of Malware (Instructor Version)
Objectives
Research and analyze malware
Background / Scenario
Malware, or malicious software, refers to a variety of malicious software programs that can be used to cause harm to…
(Answers) 5.3.1.10 Packet Tracer – Identify Packet Flow
Topology
Objectives
In this activity, you will observe packet flow in a LAN and WAN topology. You will also observe how the packet flow path may change when there is a change in…