Provide steps on how to prepare the virtual environment.
In this lab, you will exploit a vulnerable server using known exploits. You will also review the logs to
determine the compromised hosts and file.
a. Launch Oracle VirtualBox.
b. In the CyberOps Workstation window, verify that the Network is set to Internal
Network. Select Machine > Settings > Network. Under Attached To, select Internal
Network. In the dropdown menu next to Name, select inside, then click OK.

c. Launch and log into CyberOps Workstation, Kali, Metasploitable, and Security Onion
virtual machines.
d. In the CyberOps Workstation VM, open a terminal and configure the network by exe-
cuting the configure_as_static.sh script.
Because the script requires super-user privileges, provide the password for the user
analyst.
```
[analyst@secOps~]$ sudo ./lab.support.files/scripts/configure_as_static.sh
[sudo] password for analyst:
Configuring the NIC as:
IP: 192.168.0.11/24
GW: 192.168.0.1
IP Configuration successful.
[analyst@secOps ~]$
```
e. In the Security Onion VM, right-click the Desktop > Open Terminal Here. Enter the
sudo service nsm status command to verify that all the servers and sensors are ready.
This process could take a few moments. If some services report FAIL, repeat the com-
mand as necessary until all the statuses are OK before moving on to the next part.
```
analyst@SecOnion:~/Desktop$ sudo service nsm status
Status: securityonion
* sguil server [ OK ]
Status: HIDS
* ossec_agent (sguil) [ OK ]
Status: Bro
Name Type Host Status Pid Started
manager manager localhost running 5577 26 Jun 10:04:27
proxy proxy localhost running 5772 26 Jun 10:04:29
seconion-eth0-1 worker localhost running 6245 26 Jun 10:04:33
seconion-eth1-1 worker localhost running 6247 26 Jun 10:04:33
seconion-eth2-1 worker localhost running 6246 26 Jun 10:04:33
Status: seconion-eth0
* netsniff-ng (full packet data) [ OK ]
* pcap_agent (sguil) [ OK ]
* snort_agent-1 (sguil) [ OK ]
* snort-1 (alert data) [ OK ]
* barnyard2-1 (spooler, unified2 format) [ OK ]
You might also like to view...
Which of the following are valid variable names?
XxXxXx HOMEDIR file_name x09 file1 Slimit
Maps allocate keys to values and cannot contain duplicate keys, i.e., the key-to-value mapping is a __________ mapping.
a. many-to-many. b. many-to-one. c. one-to-many. d. one-to-one.
Which Cisco router command will enable you to alter the rate in which the router sends data out of a serial link?
A) Bandwidth B) Clocking C) Clock rate D) Timing
_________ is the security-based Group Policy settings that apply to a local computer and its local users
Fill in the blank(s) with correct word