Network Security
In my network security lab works, I've engaged in a range of activities designed to deepen my understanding of digital forensics and security. I've analyzed various data sources to uncover hidden information, trace origins, and identify potential security threats. I also utilized specialized tools to recover data, analyze evidence, and ensure data integrity. By exploring different system artifacts, it's given insight to help trace user activities, uncover evidence of tampering, learning how to present findings, and contribute to cases involving digital evidence. Doing these labs has create well-preparedness for the diverse challenges in the field of network security and digital forensics.
Snort Lab
In the lab, I focused on setting up and testing a Snort rule to detect specific network traffic. I created a rule to capture certain types of messages and generate alerts with a custom message. After sending several test messages to trigger the rule, I reviewed and displayed the rule I had written. Then, navigated to the log directory to find the file containing the alerts and opened it to review the generated alerts. Finally, captured a screenshot of the alerts. This lab provided a hands-on experience in creating, implementing, and verifying network security rules using Snort.
Packet Tracer Lab
In the practical exercises using Packet Tracer. One task involved setting up and connecting network devices based on instructions from a document titled "2.1.1.2 Packet Tracer - Deploying and Cabling Devices." Using a provided Packet Tracer file, I followed the steps to deploy and cable the devices correctly. Next, I tackled another task outlined in "2.1.1.4 Packet Tracer - Configure End Devices," which focused on configuring end devices and running network tests. I made sure to capture screenshots of the outcomes as specified in the instructions. These exercises have been instrumental in helping me understand the intricacies of network setup and device configuration in a simulated Packet Tracer environment.
SSL/TLS Lab
In this lab assignment, I worked individually to analyze SSL/TLS handshaking using Wireshark and a provided file named “https-justlaunchpage.” Through this lab, I identified the session ID of the SSL/TLS handshake, determined the length of the server's certificate, analyzed the number of cipher suites supported by the client's browser, and identified the server's selected cipher suite. Additionally, I found the length of the RSA Encrypted PreMaster Secret and identified the name of the company the client was communicating with. Having experienced the process of a SSL/TLS handshaking analysis it enhances my understanding of secure communication protocols and their implementation using Wireshark.
Wireshark Lab
In this assignment, I opened the file “LittlePrince_ghi.pcap” with Wireshark and answered several questions using NetworkMiner. The questions included identifying the number of DNS queries, counting HTTP sessions, finding the first and last frame numbers for uploading "LittlePrince.txt," determining the number of TCP segments used, identifying the host name and IP address of the server, and capturing part of the content of "LittlePrince.txt" from a TCP/HTTP stream. This exercise provided practical experience in network traffic analysis using Wireshark and NetworkMiner.