CyberOps Skills Assessment
CyberOps Skills Assessment
You will have access to the Internet to discover more about the events. Security Onion is the only VM
with Internet access in the Cybersecurity Operations virtual environment. You may use any reasonable
research method at your disposal. The tasks set out in this assessment are designed to provide some
guidance through the analysis process.
Content for this assessment was obtained from http://www.malware-traffic-analysis.net/ by Cisco for the
Open University and is used with permission.
For each stage of this assessment, you must provide evidence - this may be a copy/paste of
file/log information, a screenshot and a short single sentence explanation of how you find the evidence.
You will decide what evidence is appropriate.
Addressing Table
The following addresses are preconfigured on the network devices. Addresses are provided for
reference purposes:
© Cisco and/or its affiliates. All rights reserved. This document is Cisco Public - with modifications from Open University Page 1 of 5
Skills Assessment Open University - CCNA Cybersecurity Operations
6. What is the MAC address of the internal computer involved in the events? How did you find it?
MAC アドレス 00:1b:21:ca:fe:d7 Wireshark を使用
7. What are some of the Source IDs of the rules that fire when the exploit occurs? Where are the Source IDs
from?
複数のソース ID と新しい脅威の Web サイ
ト: 93.114.64.118、173.201.198.128、192.99.198.158、208.113.226.171、209.126.97.209 (209.165.200.2
35 )
8. Do the events look suspicious to you? Does it seem like the internal computer was infected or
compromised? Briefly explain.
はい、このイベントは疑わしいように見えますが、実際には内部の妥協が行われています。Flash プラグイ
ンの警告の有効期限が切れており、Angler EK の警告は、悪用または侵害の可能性を示す強力な証拠です。
What is the operating system running on the internal computer in question?
ウィンドウベースの OS
© Cisco and/or its affiliates. All rights reserved. This document is Cisco Public - with modifications from Open University Page 2 of 5
Skills Assessment Open University - CCNA Cybersecurity Operations
© Cisco and/or its affiliates. All rights reserved. This document is Cisco Public - with modifications from Open University Page 3 of 5
Skills Assessment Open University - CCNA Cybersecurity Operations
20. What is the most common file type that is related to that vulnerable software?
21. Use ELSA to gather more evidence to support the hypothesis that the host you identified above delivered
the malware. Launch ELSA and list all hosts that downloaded the type of file listed above. Remember to
adjust the time frame accordingly.
Were you able to find more evidence? If so, record your findings here.
はい。1510604611.228059|CYCGVz4HyAXsgGuNV2|209.165.201.17|47144|209.165.200.235|80|1|GET|
209.165.200.235|/mutillidae/index.php?
page=userinfo.php&username='+union+select+ccid,cciration,expiration, ,null+from+credit_cards+
–+&password=&user-info-php-submitbutton=表示+アカウント+詳細|http://209.165.200.235/
mutillidae/index.php?page=userinfo.php&username=%27+union+select +ccid%2Cccnumber
%2Cccv%2Cexpiration%2Cnull+from+credit_cards+–+&password=&user-info-php-submit-
button=View+Account+Details|1.1|Mozilla/5.0 (X11; Linuxx86_64; rv:45.0) Gecko/ 20100101
Firefox/45.0|0|960|200|OK|-|-|HTTP::URI_SQLI|-|-|-|-|-|-|FvFBhF1tikxaHjaG1|-|text/html
host=127.0.0.1 program=bro_http class=BRO_HTTP srcip=209.165.201.17
srcport=47144dstip=209.165.200.235 dstport=80 status_code=200 content_length=960
method=GETsite=209.165.200.235 uri=/mutillidae/ndex.php?page=
userinfo.php&username='+union+select+ccid,ccnumber,ccv,expiration,null+from+credit_cards+–
+&password=&user-info-php-submit-button=View+Account+Detailsreferer=http://
209.165.200.235 /mutillidae/index.php?page=userinfo.php&username=%27+union+select+ccid
%2Cccnumber%2Cccv%2Cexpiration%2Cnull+from+credit_cards+–+&password=&user-info-php-
© Cisco and/or its affiliates. All rights reserved. This document is Cisco Public - with modifications from Open University Page 4 of 5
Skills Assessment Open University - CCNA Cybersecurity Operations
25. What is the IP address that delivered the exploit kit and malware payload?
192.99.198.158
26. Pivoting from events in SGUIL, launch Wireshark and export the files from the captured packets as was
done in a previous lab. What files or programs are you able to successfully export?
3xdz3bcxc8
© Cisco and/or its affiliates. All rights reserved. This document is Cisco Public - with modifications from Open University Page 5 of 5