Implement an attack from Kali Linux to target Ubuntu
Order Instructions
In this lab, you will use the Suricata software to perform network vulnerability scans.
Complete the following:
Download the Suricata software and configure it on Ubuntu.
Implement an attack from Kali Linux to target Ubuntu.
You can research how to use Metasploit installed in the Kali Linux to start an attack. You can also use nmap to do DOS scan. It does not have to be really advanced attacks. Just research some basics and implement any attack you can do.
Provide screenshots of the intrusion detection logs.
Part 2
Write a 250-500-word lab report and address the following:
Summarize the issues encountered, lesson learned, and the successes in a bullet point format.
Describe the screenshots provided.
Analyze and decipher network traffic, identify anomalous or malicious activity, and provide a summary of the effects on the system.
Describe an incident response that could address the specific attack.
Support your lab with 1-2 resources.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.