Skip to content

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.
  • Labs icon Lab
  • A Cloud Guru
Google Cloud Platform icon
Labs

Conducting a Security Assessment

In this lab, we will use security utilities provided with Kali Linux to conduct a risk assessment. The lab provides a subnetwork of Linux and Windows servers to provide a complete VPC for exercising the Kali Linux utilities.

Google Cloud Platform icon
Labs

Path Info

Level
Clock icon Beginner
Duration
Clock icon 1h 45m
Published
Clock icon Mar 30, 2020

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Table of Contents

  1. Challenge

    Access the Kali Linux System

    1. Establish a session to the Kali Linux system:

      ssh cloud_user@<KALI_LINUX_PUBLIC_IP>
      
    2. Change to superuser:

      su -
      
  2. Challenge

    Identify the Address Assigned to the Ethernet Controller

    1. Query the ethernet configuration on the Kali Linux server:

      ifconfig
      

      Make note of the IP address assigned to the primary ethernet controller.

  3. Challenge

    Use the `nmap` Command to Explore the Subnet

    Use the nmap utility to explore the ports open on the subnetwork.

    For help with nmap commands:

    nmap -h
    

    To scan a series or range of subnet private IP addresses:

    nmap -sn 10.0.1.1-255
    

    To try other flags to speed the port scanning process:

    nmap -T4 -Pn -n -p- --min-parallelism 50 to 100 -vv 10.0.1.1-255 --max-retries 0 or 1
    
  4. Challenge

    Use the hping3 Utility to Analyze a Single Host

    Use the hping3 to scan a certain host on the subnet:

    hping3 -1 <INTERNAL_IP_ADDRESS_OF_HOST>
    

    Note: You may obtain the internal IP address of the host from the lab interface, the output from an nmap command, or the AWS dashboard.

  5. Challenge

    Use `nslookup` to Explore the Nameserver Configuration of Various Hosts

    Use nslookup to explore the A record on google.com:

    nslookup
    
    > google.com
    

    Use nslookup to look at MX records on google.com

    nslookup
    
    > set q=MX
    
    > google.com
    

    Use nslookup to interrogate other address types:

    nslookup
    
    > set type=any
    
    > google.com
    
  6. Challenge

    Use the dig Tool to Attempt a Domain Zone Transfer

    The syntax for the dig command is:

    dig axfr [domain host] [IP Address To Transfer To]
    
  7. Challenge

    Use `finger` to Determine Which Users Are Logged into Any Given Host

    Use the finger command to see who is logged in on a host:

    finger
    

    Or:

    finger -s root
    

The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!

What's a lab?

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Provided environment for hands-on practice

We will provide the credentials and environment necessary for you to practice right within your browser.

Guided walkthrough

Follow along with the author’s guided walkthrough and build something new in your provided environment!

Did you know?

On average, you retain 75% more of your learning if you get time for practice.

Start learning by doing today

View Plans