Author Archives: Scott
In this last post, I wrote a course overview that summarizes all of the labs that we performed this semester. I categorized the labs into a handful of common categories, and discussed some of the pros and cons as well … Continue reading
In our semester long project we developed a hands-on lab. For our lab, we decided to look at log collection, aggregation, and analysis. We have step-by-step instructions that show how to install Elasticsearch and Kibana, and then ingest a sample … Continue reading
In our final individual lab, we analyze a Windows Memory image using Volatility.
In lab 11, we do some forensic analysis on a Windows Registry image using RegRipper.
In this weeks lab, we discuss different network reconnaissance techniques by using whois, nslookup, dig, and nmap.
In this week’s lab we take another look at symmetric and asymmetric encryption examples with ccrypt and GPG.
Web Application Security: SQL Injection Attacks In this lab we walk through the sql injection exercise on the Damn Vulnerable Web Application in low, and medium and as a bonus I did the high security level as well.
This lab focuses on network forensics. We analyze a packet capture to retrieve HTTP requests, and websites visited as well as identify a few emails that were sent and carve our an image attachment from one of the emails.
This week we use msfvenom to tailor an exploit with a payload to target a vulnerable Windows 7 box and establish a reverse shell in Metasploit.
In this lab we use nmap to find open ports on a vulnerable Windows machine, and then use Metasploit to identify a module to target the open port/service to DoS the box.