Author Archives: Scott

Course overview, review, and job decriptions

In this last post, I wrote a course overview that summarizes all of the labs that we performed this semester. I categorized the labs into a handful of common categories, and discussed some of the pros and cons as well … Continue reading

Posted in IST 894 Portfolio | Leave a comment

IST 894 Term Project

In our semester long project we developed a hands-on lab. For our lab, we decided to look at log collection, aggregation, and analysis. We have step-by-step instructions that show how to install Elasticsearch and Kibana, and then ingest a sample … Continue reading

Posted in IST 894 Portfolio | Leave a comment

Cyber Range Lab Assignment 12

In our final individual lab, we analyze a Windows Memory image using Volatility.

Posted in IST 894 Portfolio | Leave a comment

Cyber Range Lab Assignment 11

In lab 11, we do some forensic analysis on a Windows Registry image using RegRipper.

Posted in IST 894 Portfolio | Leave a comment

Cyber Range Lab Assignment 10

In this weeks lab, we discuss different network reconnaissance techniques by using whois, nslookup, dig, and nmap.

Posted in IST 894 Portfolio | Leave a comment

Cyber Range Lab Assignment 9

In this week’s lab we take another look at symmetric and asymmetric encryption examples with ccrypt and GPG.

Posted in IST 894 Portfolio | Leave a comment

Cyber Range Lab Assignment 8

Web Application Security: SQL Injection Attacks In this lab we walk through the sql injection exercise on the Damn Vulnerable Web Application in low, and medium and as a bonus I did the high security level as well.

Posted in IST 894 Portfolio | Leave a comment

Cyber Range Lab Assignment 7

This lab focuses on network forensics. We analyze a packet capture to retrieve HTTP requests, and websites visited as well as identify a few emails that were sent and carve our an image attachment from one of the emails.

Posted in IST 894 Portfolio | Leave a comment

Cyber Range Lab Assignment 6

This week we use msfvenom to tailor an exploit with a payload to target a vulnerable Windows 7 box and establish a reverse shell in Metasploit.

Posted in IST 894 Portfolio | Leave a comment

Cyber Range Lab Assignment 5

In this lab we use nmap to find open ports on a vulnerable Windows machine, and then use Metasploit to identify a module to target the open port/service to DoS the box.

Posted in IST 894 Portfolio | Leave a comment