Question

Complete the tasks described in this worksheet. Read the instructions carefully and submit evidence of your...

Complete the tasks described in this worksheet. Read the instructions carefully and submit evidence of your completed tasks (a screen shot is your evidence). Answer the questions below in the space provided. Showing Evidence of Completion: Your evidence of completion is a screen shot, as described in each exercise. Use the tool of your choice to take a screen shot of the required content. Screen shots should be pasted at the end of this document. Answering Questions: Your answers should be written in carefully edited college-level English, using complete sentences. Lab – Analyze and Differentiate Types of Malware Instructions and Evidence of Completion Answer a Question At the end of this document (not within this table) paste screen captures that show the following: the version of bash running on the Ubuntu system; the detection of the Shell Shock vulnerability found on the Apache server; the rkhunter tool displaying the Rootkit vulnerability it found. Be sure your screen shot(s) include the command executed and the resulting output. Answer each of the questions below; use the space to the right of each question for your answer. Make sure your answers are clear and complete. Questions Answer What command was used to determine the version of BASH running on the Ubuntu client? What version was in use there? What does the acronym “CVE” stand for and In your own words explain what it represents. It stands for Common Vulnerabilities and Exposures and basically it is a catalog of known security threats sponsored by the Department of Homeland Security. What was the specific BASH vulnerability found on the Ubuntu client? When this vulnerability was attacked what ability was provided to the attacking machine? What command was executed to start the web server service on the Security Onion? In a Linux file system, how are hidden files or directories named?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. To check the bash version of your Ubuntu using the command line :

           Open the terminal by preesing ctrl+alt+T.

          Type : . /etc/lsb-release and press Enter. or

                    lsb_release -r

           this is the command to check the ubuntu version.

2. you can check the version using two ways :

Check with in unity: it gives the partial version.

Put a short command line: this method gives the full version.

3. The CVE stand for Common Vulnerabilities and Exposures .CVE system provides a reference-method for publicly known information-security vulnerabilities and exposures. the catalog is sponsored by the United States Department of Homeland Security (DHS).

Threats are divided into two categories: vulnerabilities and exposures.

Vulnerability : a vulnerability is a mistake in software code that gives opportunity to an attacker with direct access to a system or network. It allow an attacker to pose as a superuser or system administrator who has full access privileges.

Exposure : It is defined as a mistake in software code or configuration that provides an attacker with indirect access to a system or network. an exposure may allow an attacker to secretly gather customer information that could be sold.

4. If a security issue affects the releases of Ubuntu and its derivatives.

5. if an attacker were able to create an environment variable containing a function defintion with specific name. then these are used to bypass certain environment.this is the ability was provided to the attacking machine.

6.Security Onion for Splunk is designed to run on a Security Onion server, providing an alternative method for correlating events and incorporating field extractions and reporting.

Squert : Squert is a web application that is used to query and view event data stored in a Sguil database

to start all services

   sudo service nsm start;

   sudo nsm_server_ps_start.

Add a comment
Know the answer?
Add Answer to:
Complete the tasks described in this worksheet. Read the instructions carefully and submit evidence of your...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Read the following scenario and rubric carefully. Write 3-4 paragraph response to the questions. Submit your...

    Read the following scenario and rubric carefully. Write 3-4 paragraph response to the questions. Submit your responses in the text box or upload a Word document and submit. Attitudes and Values, Communication, Conflict Management, Business Professionals, Customer Service Jill and Eric worked together at an advertising agency. Jill was the director of marketing for the Power Protein account and Eric was the project manager on the account. They both reported to the same vice president. They usually worked well together...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • To submit this assignment, students will complete the Lab Worksheet on pages 11-19, then upload their...

    To submit this assignment, students will complete the Lab Worksheet on pages 11-19, then upload their completed document as a DOC or PDF file in Canvas Table 5: Black Forest Natural Selection Simulation (Predators) Predators Generation Forks Knives Spoons Total Number 1 Starting number 2 2 2 6 Number surviving Eliminate the three least 1 0 2 3 successful feeders 2 2 0 4 6 Starting number # surviving in previous generation multiplied by 2 Number surviving Eliminate the three...

  • please help!! hoose a Tool to Design Your Wireframes You may use any tool available to...

    please help!! hoose a Tool to Design Your Wireframes You may use any tool available to you that will allow you to create simple skeletal sketches of each screen or page, and to label the location of the key elements described in Part B of the assignment. You should save the sketches in one of the following formats: docx, .pptx, .sketch, .psd, .pdf, .png, .jpg, .gif, .png, or .rtf. Possible tools include Paint, PowerPoint, Word, Adobe Illustrator, Visual Studio, Visio,...

  • Read carefully the attached document and then post your comments bearing in mind the following questions:...

    Read carefully the attached document and then post your comments bearing in mind the following questions: 1- What are the pros and cons of rent controls? 2- Why economists disagree on the usefulness of rent control? 3- Do you believe rent control can help the poor? Do rent controls work_ - The Economist explains.pdf If no link is opened containing the answers to be extracted This is the content .. Do rent controls work? Publication info: The Economist (Online) ;...

  • Part II: SPSS Application These questions require the use of SPSS. Remember you must submit all of your work within this word document. You will need to take a screen shot of your data view if ne...

    Part II: SPSS Application These questions require the use of SPSS. Remember you must submit all of your work within this word document. You will need to take a screen shot of your data view if necessary, or copy and paste your output into the spaces below. Remember to report the exact p value provided by SPSS output – simply reporting p<.05 or p>.05 is not acceptable (unless SPSS output states p=.000 – in that case you can report p<.001)....

  • In Module Four, submit a systems analysis for your project, including a comprehensive entity-relationship diagram (ERD)....

    In Module Four, submit a systems analysis for your project, including a comprehensive entity-relationship diagram (ERD). Although you may use any tool to complete the ERD, it is strongly recommended that you use Microsoft Visio and then save the diagram into an image format (GIF or JPG) and then copy and paste the image into your systems analysis. All sections of this milestone should be compiled into a single Word document. Furthermore, all of Milestone One should be included in...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Please carefully look at the instructions and asnswe it. i have also attached the 2019 1040...

    Please carefully look at the instructions and asnswe it. i have also attached the 2019 1040 Form and Schedule 1. Please show your work on the tax return form as well. Thank you so much in advance Use 2020 Tax Rates Schedules That is all the information i have Required information [The following information applies to the questions displayed below.) Marc and Michelle are married and earned salaries this year of $64,000 and $12,000, respectively. In addition to their salaries,...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT