If you do not have the Hardware or Software, then

If you do not have the Hardware or Software, then research the commands using the web.

Hardware/Software Setup Required

Router or CISCO Packet Tracer 7.1.0 (available at this website)

Note: The lab requires a CISCO router or access to the Internet.

Problem Description

When investigating an attack to a router, you need to gather volatile evidence using either direct or indirect access. Direct access is carried out using show commands. Indirect access can be carried out only if the attacker has changed the passwords. This is done by port-scanning every router’s IP information.

In this lab, you will practice acquiring volatile information from a router using various show commands.

Problem Description

When investigating an attack to a router, you need to gather volatile evidence using either direct or indirect access. Direct access is carried out using show commands. Indirect access can be carried out only if the attacker has changed the passwords. It can be carried out by port-scanning every router IP.

In this lab, you will practice acquiring volatile information from a router using various show commands.

Estimated completion time: 60 minutes.

Outcome

Report the steps for performing the task above.

Validation/Evaluation

How to use various show commands to display the following information:

o Clock details 

o Router’s version

o Running configuration

o Startup configuration

o Routing table

o ARP table

o List of users

o List of interfaces

o Routing protocols

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions