What are the steps to Prepare the Hosts to Capture the Traffic

What will be an ideal response?


a. Start the CyberOps VM. Log in with username analyst and the password cyberops.
b. Start Mininet.
[analyst@secOps ~]$ sudo lab.support.files/scripts/cyberops_topo.py
c. Start host H1 and H4 in Mininet.
*** Starting CLI:
mininet> xterm H1
mininet> xterm H4
d. Start the web server on H4.
[root@secOps analyst]# /home/analyst/lab.support.files/scripts/reg_server_
start.sh
e. Start the web browser on H1. This will take a few moments.
[root@secOps analyst]# firefox &
f. After the Firefox window opens, start a tcpdump session in the terminal Node: H1 and
send the output to a file called capture.pcap. With the -v option, you can watch the
progress. This capture will stop after capturing 50 packets, as it is configured with the
option -c 50.
[root@secOps analyst]# tcpdump -i H1-eth0 -v -c 50 -w /home/analyst/capture.
pcap
g. After the tcpdump starts, quickly navigate to 172.16.0.40 in the Firefox web browser.

Computer Science & Information Technology

You might also like to view...

is an example of primary memory.

a) TCP b) RAM c) ALU d) CD-ROM

Computer Science & Information Technology

Some 3d printers work by controlling the exact locations where a liquid ________ will be exposed to oxygen and become solid

A) resin B) peptides C) polymer D) silicon

Computer Science & Information Technology

double a; a = 3;

What will be an ideal response?

Computer Science & Information Technology

Identify the foreign keys in this schema. Explain how the entity and referential integrity rules apply to these relations.

What will be an ideal response?

Computer Science & Information Technology