Interpreting Security Tool Output
Security tools greatly simplify the task of assessing the security of your environments. However, there is still room for interpretation of reported results and analysis of data. In this Lab, you will use two popular security tools and learn how to understand more about what the tools are doing and how to interpret their results.
You will use Kali Linux as the security platform. You will scan a vulnerable host on the local network and analyze live traffic. The local network for this Lab is contained within a Hyper-V virtual environment. The hosts on the network consist of a variety of Linux and Windows hosts.
This Lab is designed for the CREST Practitioner Security Analyst (CPSA) certification examination but is of value to security practitioners in general.
Upon completion of this Lab you will be able to:
- Perform fast and full port scans of targets using Nmap
- Understand the steps Nmap takes in performing scans
- Analyze network traffic using Wireshark
- Use Wireshark to understand how security tools communicate over the network
You should be familiar with:
- Nmap and ARP Scanner basics
- TCP/IP and OSI network model basics
July 9th, 2020 - Enabled direct browser RDP connection for a streamlined experience
Logan has been involved in software development and research since 2007 and has been in the cloud since 2012. He is an AWS Certified DevOps Engineer - Professional, AWS Certified Solutions Architect - Professional, Microsoft Certified Azure Solutions Architect Expert, MCSE: Cloud Platform and Infrastructure, Google Cloud Certified Associate Cloud Engineer, Certified Kubernetes Security Specialist (CKS), Certified Kubernetes Administrator (CKA), Certified Kubernetes Application Developer (CKAD), and Certified OpenStack Administrator (COA). He earned his Ph.D. studying design automation and enjoys all things tech.