Author Archives: Scott
Course overview, review, and job decriptions
In this last post, I wrote a course overview that summarizes all of the labs that we performed this semester. I categorized the labs into a handful of common categories, and discussed some of the pros and cons as well … Continue reading
IST 894 Term Project
In our semester long project we developed a hands-on lab. For our lab, we decided to look at log collection, aggregation, and analysis. We have step-by-step instructions that show how to install Elasticsearch and Kibana, and then ingest a sample … Continue reading
Cyber Range Lab Assignment 12
In our final individual lab, we analyze a Windows Memory image using Volatility.
Cyber Range Lab Assignment 11
In lab 11, we do some forensic analysis on a Windows Registry image using RegRipper.
Cyber Range Lab Assignment 10
In this weeks lab, we discuss different network reconnaissance techniques by using whois, nslookup, dig, and nmap.
Cyber Range Lab Assignment 9
In this week’s lab we take another look at symmetric and asymmetric encryption examples with ccrypt and GPG.
Cyber Range Lab Assignment 8
Web Application Security: SQL Injection Attacks In this lab we walk through the sql injection exercise on the Damn Vulnerable Web Application in low, and medium and as a bonus I did the high security level as well.
Cyber Range Lab Assignment 7
This lab focuses on network forensics. We analyze a packet capture to retrieve HTTP requests, and websites visited as well as identify a few emails that were sent and carve our an image attachment from one of the emails.
Cyber Range Lab Assignment 6
This week we use msfvenom to tailor an exploit with a payload to target a vulnerable Windows 7 box and establish a reverse shell in Metasploit.
Cyber Range Lab Assignment 5
In this lab we use nmap to find open ports on a vulnerable Windows machine, and then use Metasploit to identify a module to target the open port/service to DoS the box.