Toaz - Info Cyberops Skills Assessment PR
Toaz - Info Cyberops Skills Assessment PR
Toaz - Info Cyberops Skills Assessment PR
5. According to SGUIL, when did the exploit begin? When did it end? Approximately how long did it take?
Start at 2017-09-07 15:31:12
End at 2017-09-07 15:31:34
Approximately 22 seconds
6. What is the IP address of the internal computer involved in the events?
192.168.0.12
7. What is the MAC address of the internal computer involved in the events? How did you find it?
00:1b:21:ca:fe:d7, can be found by right clicking on Alert ID and opening Wireshark
8. What are some of the Source IDs of the rules that fire when the exploit occurs? Where are the Source IDs
from?
2014726, 2018442, 2019224, 2019488, 2020356, 2018954, 2021120, 2020491, 2018316,
2019645 - Select an event, and in the bottom right window select Show Rule
9. Do the events look suspicious to you? Does it seem like the internal computer was infected or
compromised? Briefly explain.
Yes, it seems to be with some trojan activity.
10. What is the operating system running on the internal computer in question?
Windows XP/2000, can be found by right clicking on Alert ID and select Transcript or Bro
© Cisco and/or its affiliates. All rights reserved. This document is Cisco Public - with modifications from Open University Page 1 of 4
Skills Assessment CCNA Cybersecurity Operations
© Cisco and/or its affiliates. All rights reserved. This document is Cisco Public - with modifications from Open University Page 2 of 4
Skills Assessment CCNA Cybersecurity Operations
22. What is the most common file type that is related to that vulnerable software?
____________________________________________________________________________________
23. Use ELSA to gather more evidence to support the hypothesis that the host you identified above delivered
the malware. Launch ELSA and list all hosts that downloaded the type of file listed above. Remember to
adjust the time frame accordingly.
Were you able to find more evidence? If so, record your findings here.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
24. At this point you should know, with quite some level of certainty, whether the site listed discovered earlier
delivered the malware. Record your conclusions below.
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
© Cisco and/or its affiliates. All rights reserved. This document is Cisco Public - with modifications from Open University Page 3 of 4
Skills Assessment CCNA Cybersecurity Operations
27. What is the IP address that delivered the exploit kit and malware payload?
___________________________________________________________________________________
28. Pivoting from events in SGUIL, launch Wireshark and export the files from the captured packets as was
done in a previous lab. What files or programs are you able to successfully export?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
© Cisco and/or its affiliates. All rights reserved. This document is Cisco Public - with modifications from Open University Page 4 of 4