Provide steps to create and encrypt files.
In this part, you will create a few text files that will be used to create encrypted zip files in the next
step.
Step 1. Create text files.
a. Start the CyberOps Workstation VM.
b. Open a terminal window. Verify that you are in the analyst home directory. Otherwise,
enter cd ~ at the terminal prompt.
c. Create a new folder called Zip-Files using the mkdir Zip-Files command.
d. Move into that directory using the cd Zip-Files command.
e. Enter the following to create a text file called sample-1.txt.
```
[analyst@secOps Zip-Files]$ echo This a sample text file > sample-1.txt
[analyst@secOps Zip-Files]$ echo This a sample text file > sample-2.txt
[analyst@secOps Zip-Files]$ echo This a sample text file > sample-3.txt
```
f. Verify that the files have been created, using the ls command.

Step 2. Zip and encrypt the text files.
Next, we will create several encrypted zipped files using varying password lengths. To do so,
all three text files will be encrypted using the zip utility.
a. Create an encrypted zip file called file-1.zip containing the three text files using the fol-
lowing command:
```
[analyst@secOps Zip-Files]$ zip –e file-1.zip sample*
```
b. When prompted for a password, enter a one-character password of your choice. In the
example, the letter B was entered. Enter the same letter when prompted to verify.

c. Repeat the procedure to create the following 4 other files
? file-2.zip using a 2-character password of your choice. In our example, we used
R2.
? file-3.zip using a 3-character password of your choice. In our example, we used
0B1.
? file-4.zip using a 4-character password of your choice. In our example, we used
Y0Da.
? file-5.zip using a 5-character password of your choice. In our example, we used
C-3P0.
d. Verify that all zipped files have been created using the ls command.

e. Attempt to open a zip file using an incorrect password as shown.

You might also like to view...
________ is a popular service that allows free phone calls over the Internet
Fill in the blank(s) with correct word
Which of the following statements is false?
a. A finally block is placed after the last catch block. b. A finally block typically releases resources acquired in the corresponding try block. c. The finally block and try block can appear in any order. d. A finally block is optional.
Which variable assignment method is useful when you need information from the user to complete the script?
A. Conditional B. Direct assignment C. Prompt D. Positional parameter
Describe the different tools of law enforcement agencies for investigating computer crimes and analyze which one is most applicable for current technological developments
What will be an ideal response?