IT262M2-2: Describe steps and techniques to perform enumeration, scanning, and packet capture.
Purpose
You will complete two labs in this assessment.
In the first lab, an infected computer may have certain signs like being slower than normal, lots of pop-up ads or it may crash. Computers may be infected even with antivirus applications installed. This lab provides insight into how to tell if a computer is infected and explains what to do if a computer is infected.
In the second lab you will use packet capture utilities to look at different types of IP traffic. Wireshark® is used primarily but also TCPDump and NetWitness® Evaluator. Then, you will look for specific information in the specific capture tool.
Read the assessment and respond to the checklist items based on the reading and learning activities.
Instructions
Part 1: Identifying and Removing Malware on a Windows System
Lab Instructions
This lab provides the hands-on element to your studies. It allows you to gain practical experience using the tools and techniques associated with ethical hacking.
Access the lab link entitled “Identifying and Removing Malware on a Windows System” in this assessment section.
The following resources will help you get oriented in the lab environment: the Common Lab Tasks Manual and J and B Lab Tips. The manual will provide detail and the tips are a very abbreviated reference.
Open a new Microsoft® Word® document and put your name and assessment number at the top.
In the lab environment, you will find instructions for the specific lab, which can be downloaded. Follow the instructions.
Complete the instructions in Step 1. Compile your lab report in the document with a title page and an easy to understand explanation of what you are doing and why you are doing it. Within your Word document, after your lab report, answer the question in Step 2.
Conduct research and cite supporting sources in APA format where appropriate.
Complete the following:
Step 1:
Open the lab entitled ” Identifying and Removing Malware on a Windows System.”
Review the following material in the lab environment:
Before you Begin
Introduction
Section 1. Hands-On Demonstration
When you are ready to begin click: “Section 2: Applied Learning.”
Complete Parts 1, 2, and 3. Make sure to obtain the required screenshots that are noted in the lab instructions and rubric.
It is not necessary to transfer the scan file to your computer.
As part of the mastery requirements for this competency assessment, complete the following boldfaced item and place into the Word document:
Provide a minimum 200-word overview of the lab.
Step 2:
Answer the following question in the lab document as part of the lab submission. Respond with a minimum of 100 words.
1. What are the different ways that antivirus software can identify malware?
As part of the mastery requirements for this competency assessment, complete the following boldfaced item and place into the Word document:
Provide a minimum of 400 words to the following:
What are the different ways that antivirus software can identify malware?
Part 2: Analyzing Network Traffic to Create a Baseline Definition
Lab Instructions
This lab provides the hands-on element to your studies. It allows you to gain practical experience using the tools and techniques associated with ethical hacking.
Access the lab link entitled “Analyzing Network Traffic to Create a Baseline Definition” in this assessment section.
The following resources will help you get oriented in the lab environment: the Common Lab Tasks Manual and J and B Lab Tips. The manual will provide detail and the tips are a very abbreviated reference.
You will append the results of the second lab to the results of the first lab. Make sure to label the labs.
In the lab environment, you will find instructions for the specific lab, which can be downloaded. Follow the instructions.
Complete the instructions in Step 1. Compile your lab report in the document with a title page and including explanatory text where needed or required by the lab. Within your document, after your lab report, answer the question in Step 2.
Conduct research and cite supporting sources in APA format where appropriate.
Complete the following:
Step 1:
Open the lab entitled “Analyzing Network Traffic to Create a Baseline Definition.”
Click the “Start Lab” tab in the middle of the webpage.
Review the following material in the lab environment:
Before you Begin
Introduction
Section 1. Hands-On Demonstration
When you are ready to begin click: “Section 2: Applied Learning.”
Complete Parts 1, 2, 3, 4, and 5. Make sure to obtain the required screenshots that are noted in the lab instructions and rubric.
As part of the mastery requirements for this competency assessment, complete the following boldfaced item and place into the Word document:
Using a minimum of 5 steps, provide a step-by-step guide to password hash file extraction and cracking using a well-known password cracking tool.
Step 2:
Answer the following question in the lab document as part of the lab submission. Respond with a minimum of 100 words.
1. What are some ways to make sure that passwords cannot be captured by packet capture utilities?
As part of the mastery requirements for this competency assessment, complete the following boldfaced item and place into the Word document:
Using a minimum of 100 words, explain how security password policy compliance can be checked using Wireshark.
Directions for Submitting Your Assessment
Compose your assessment in a Microsoft Word document. Save the document as IT262_YourName_Assessment_2 and submit it to the Dropbox for this assessment.