CompTia Security+  — CertMaster Lab SY0–601

CompTia Security+  — CertMaster Lab SY0–601

June 15, 2023

CompTia Security+ — CertMaster Lab SY0–601

Exploring the Lab Environment

Scenario

In this activity, you will familiarize yourself with the systems you will be using in the course activities.

Using the Lab Interface

To complete most of the labs in this course, you will use one or more Virtual Machines (VMs) hosted on a cloud platform. Each VM works very much like a physical computer, but you access them via your browser. The main thing to remember is that your WINDOWS/START key will work on your own computer not the VM. Take a few moments to familiarize yourself with some other features of the lab browser controls.

  1. In this pane, select the Resources tab heading. When you have reviewed the Resources tab contents, select the Instructions tab to follow these steps again.
  2. The Resources area is used to show the VMs you have available to you plus any downloadable files that may be useful during a lab. You can choose a different ISO disc to load in each VM’s DVD drive and also change the virtual network that the VM is connected to. You can also open each VM in a new window if you find it easier to switch between them that way.
  3. Looking at the Instructions tab again, notice that each of these tasks has a check box for you to use to record your progress. As you complete each step, select the box to mark it as complete.
  4. Select the Help tab. Select the Instructions tab to view these steps again afterwards.
  5. You can use the Help page to get assistance with technical issues and view more advanced information about using the lab interface.
  6. Also, note that the Help tab features a zoom control to allow you to make these instructions appear in larger or smaller font.
  • Finally, note the timer counting down below the lab title. You will have the option of extending the lab for a limited amount of time, so please plan accordingly. If you run out of time, don’t worry you will always be able launch the lab again.
  • Aim to complete assisted labs in 15–30 minutes.
  • Aim to complete applied labs in 30–45 minutes.
  1. Looking at the pane containing the VM, in the top-left corner, select the Display icon

and select Full Screen.

  1. Working in full screen mode is usually best because it allows the maximum possible screen resolution for the VM you are operating. The other options in this menu allow you to fit the VM screen to the browser window or refresh the display, if it does not seem to be updating.
  2. If you are using a Windows computer to access these labs, press the START key on your keyboard. Notice that this activates the Taskbar on your PC. In some browsers, this might also cause the lab environment to exit full screen mode.
  3. If necessary, switch to Full Screen mode again then select the Lightning icon
  1. to open the menu — do not select anything from the menu yet.
  2. This menu allows you to send START key combinations and the CTRL+ALT+DEL key sequence to the VM.
  3. There is also a virtual keyboard for use if you find you have trouble typing particular characters. The VMs use a US keyboard layout so if your own physical keyboard has a different layout you may find that some keys do not type the same symbols.
  4. You can also use the Power menu to reset or turn off the VM. You should generally only do this if instructed.
  5. Select the following Ctrl+Alt+Delete button embedded in the instructions. This activates sign-in on the Windows VM.
  6. Now that you are familiar with the lab interface, let’s look at the guest VMs you will be using. Select the Next button to continue.

Explore Windows VMs

The Windows network contains a domain controller and member server both running Windows Server 2016.

  • DC1 is configured as the network’s domain controller (DC). Normally the DC role should not be combined with other roles, but to minimize the number of VMs you have to run, this machine is also configured as a DNS server and CA (certificate authority) server and will be used for a number of other services and configurations. This VM is configured with a static IP address (10.1.0.1).
  • MS1 is configured as a member server for running applications. It runs a DHCP service to perform auto addressing for clients connecting to the network. It has the web server IIS and the email server hMail installed. This VM is also configured with a static IP address (10.1.0.2).

You will usually use the username 515supportAdministrator to log on to the Windows PCs. Each user account uses the password Pa$$w0rd (awful security practice, but it makes the activities simpler for you to complete).

  1. At each point in an activity, you should ensure that you are working within the correct virtual machine. The correct VM may usually be accessed by selecting a shortcut link in the instructions. For example, the MS1 VM is currently selected. To switch to the DC1 virtual machine, select DC1
  • Virtual machines may also be selected from a menu at the top of the lab user interface or from the Resources tab in this pane.
  1. With the DC1 VM active, select Ctrl+Alt+Delete and then select the password box. Select the icon preceeding the following text to autotype it Pa$$w0rd.
  2. Press ENTER or select the arrow button to submit the password and log on.
  3. Point to the network icon in the taskbar. The tooltip should read “corp.515support.com.”
  4. If a lab is not working as you expect, check that DC1 has identified the network link. If it is listed as “Unknown,” disable and enable the adapter to reset it.
  5. Right-click the Start button and select Network Connections.
  6. In the Network Connections console, right-click the Ethernet adapter and select Disable.
  7. Right-click the Ethernet adapter and select Enable.
  8. The connection should be identified as “corp.515support.com.”
  9. Switch to the MS1 VM and, if necessary, select the following link to submit Ctrl+Alt+Delete and dismiss the privacy screen. Enter the password Pa$$w0rd.
  10. Point to the network icon in the taskbar. Again, the tooltip should read “corp.515support.com.”
  11. In Server Manager, select Tools > DHCP. Expand the ms1.corp.515support.com server node.
  12. The IPv4 node should show with a green tick. If the network on MS1 has been listed as “Unknown,” you may also need to restart the DHCP server to activate the scope.
  13. Right-click the ms1.corp.515support.com server node, select All Tasks, and select Restart.
  14. Right-click the ms1.corp.515support.com server node and select Refresh.
  15. Select the IPv4 node and confirm that it is shown with a green tick icon.
  16. In some tasks, you will be asked to install software or other resources from a DVD. The lab user interface can load DVD ISO images for you.
  17. Select this link ODYSSEUS to load a DVD in MS1’s optical drive.
  18. Open File Explorer from the taskbar and browse to the DVD drive. You should see the contents of the Odysseus DVD. Do not install any software at this time.
  19. Select Start and then right-click Windows PowerShell and select Run as administrator to open an elevated PowerShell prompt. Select Yes in the UAC prompt.
  • In some exercises you will use the traditional Windows command prompt (cmd.exe) and in others you will use Windows PowerShell.
  1. The lab interface can automatically type commands for you when you are using Windows virtual machines. For example, select hostname and observe that the command is typed in the PowerShell console of the VM.
  2. Enter Get-NetIPAddress to display the IP address configuration for each interface.
  3. Enter exit to close PowerShell.

Explore PT1-Kali VM

The PT1-Kali VM is running the Kali pen testing/forensics Linux distribution, created and maintained by Offensive Security (kali.org). You will be using this VM for some security posture assessment and pen testing activities, as well as general Linux configuration management. Kali is based on the Debian Linux distribution with the GNOME desktop environment.

  1. Select the PT1-Kali VM. Note that this VM has not been started automatically. Select the Start button to boot it now.
  • In some browsers, you may see the Start button superimposed on the previous VM desktop. This is a graphical bug, which should clear when you select the button.
  1. When the VM has started, log on with the username root and the password Pa$$w0rd.
  • In this virtualization environment, the Linux VMs can fail to register the first key press after you click into the screen. Also, you cannot use the automatic Type Text feature with the Linux virtual machines.
  • Kali will screen lock if not used. To restore the screen, click-and-drag the privacy shader up, rather than just clicking it.
  1. Take a few moments to familiarize yourself with the desktop. Some key points to note are:
  • The desktop contains shortcuts to some of the applications, notably Firefox (web browser), Thunderbird (email client), and Wireshark (packet capture and analysis).
  • On the top menu panel, you can access shortcuts to all applications plus shortcuts for the file browser and terminal. When you open windows, you can use this panel to switch between them.
  • The Network icon
  • in the top menu panel allows you to change network settings using the Network Manager application.
  • The Power icon
  • allows you to reboot and shut down the VM.
  1. Figure: Gnome desktop in the KALI VM. Use the Dash to open applications and the menu bar to configure settings such as the network interface. (Screenshot used with permission from Offensive Security.)
  2. Right-click the desktop and select Open Terminal Here.
  3. Run ip a to check the network adapter configuration.
  • Remember that the Linux command-line is case-sensitive. Also recall that Type Text is not available. You will have to manually enter commands when using the Linux virtual machines.
  1. The main eth0 adapter is configured to use DHCP. The DHCP servers are configured to reserve an address where the last octet is .192 for the PT1-Kali VM.
  2. Run the following two commands to start the web server and open the local website in the browser:
  1. Note the way that the commands are formatted within separate shaded boxes. When entering longer commands, ignore any line breaks within the shaded boxes.

Identify Appliance VMs

In the activities, you will use various security appliance VMs to implement network routing and security functions. These appliance VMs are as follows:

  • RT1-LOCAL | RT2-ISP | RT3-INT VMs — these VMs are running the VyOS Linux distribution (vyos.io) and are used to route traffic between the different subnets configured on the various virtual switches. You will be discovering more about the network topology in later activities so we will not explain more here.
  • If you do want to investigate the VyOS configurations, the username is vyos and the password is Pa$$w0rd.
  • UTM1 — this is a UTM security appliance created by Netgate (pfsense.org) from the OpenBSD version of UNIX. pfSense is operated using a web GUI (http://10.1.0.254). The username is admin and the password is Pa$$w0rd. This VM is not included in this orientation lab.
  • SIEM1 — Security Onion (securityonion.net) is a network security monitoring (NSM) tool. It provides various GUI and web interfaces to its intrusion detection and incident monitoring tools. The username is administrator and the password is Pa$$w0rd. This VM is not included in this orientation lab.

Identify Linux Server VMs

There are also two Linux servers:

  • LAMP is built on the Ubuntu Server distribution (ubuntu.com) and runs the familiar Linux, Apache, MySQL, and PHP functions of a web server. LAMP is also installed with email and DNS servers. As a server distribution, this VM has no GUI shell. The username is lamp and the password is Pa$$w0rd. This VM is not included in this orientation lab.
  • LX1 is a CentOS Linux distribution (centos.org) that has been installed with intentionally vulnerable web services. This VM is usually positioned on the local network with the Windows VMs and has a DHCP reservation for the address 10.1.0.10. The username is centos and the password is Pa$$w0rd

Assisted and Applied Lab Activities

To complete the labs in this series, you must submit a response to each scored task. This lab series comprises two different types of activity with different rules for scoring:

  • Assisted labs confirm your knowledge and guide you through the steps to achieve a given configuration. In an assisted lab, if you get a scored question incorrect, you may repeat the question and achieve the correct answer. You do not need a correct answer to move forward through the lab.
  • Applied labs challenge your ability to configure given settings and display knowledge of concepts, tools, and options without detailed step instructions. In an applied lab, if you get a scored question incorrect, you may not repeat the question or change your answer. You do not need a correct answer to move forward through the lab.

Article posted by: https://certmaster.me/comptia-security-certmaster-lab-sy0-601-8bd5918a8e94?source=rss-d9e5f258a4e8——2
——————————————————————————————————————–
Infocerts, 5B 306 Riverside Greens, Panvel, Raigad 410206 Maharashtra, India
Contact us – https://www.infocerts.com

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.