Provide steps to prepare the virtual environment.

Looking at logs is very important but it is also important to understand how network transactions hap-
pen at the packet level.

In this lab, you will analyze the traffic in a previously captured pcap file and extract an executable from
the file.

a. Launch Oracle VirtualBox. Right-click CyberOps Workstation > Settings > Network.

Beside Attached To, select Bridged Adapter, if necessary, and click OK.

b. Log in to the CyberOps Workstation VM (username: analyst / password: cyberops),

open a terminal, and run the configure_as_dhcp.sh script.
```
[analyst@secOps ~]$ sudo ./lab.support.files/scripts/configure_as_dhcp.sh
[sudo] password for analyst:
[analyst@secOps ~]$
```

Computer Science & Information Technology

You might also like to view...

If you need to create a file that can be opened by other word processing programs, you can save your document in the ________ format

A) RTF B) DOC C) DOCX D) PDF

Computer Science & Information Technology

Which statement is false?

a. Queue is a new collection interface introduced in J2SE 5.0. b. Queue and PriorityQueue are included in the java.util package. c. PriorityQueue orders elements in increasing order, so that smallest value will be the first element removed from PriorityQueue. d. Queue extends interface Collection.

Computer Science & Information Technology