This document outlines 20 tasks for a cyber security end semester lab exam, including pausing a web server scan, showing packet traces in hexadecimal and ASCII formats using TCPDUMP, auditing a hash value and passwords with John the Ripper, listing Nikto plugins, port scanning with Nikto, checking version details, filtering TCPDUMP output by source, listing interfaces, checking port 80 at Wireshark, using OR conditions to check protocols, saving scan results and packet captures to files, checking databases with Nikto, capturing packets without or with only second-level timestamps, and reading a saved packet capture file.
This document outlines 20 tasks for a cyber security end semester lab exam, including pausing a web server scan, showing packet traces in hexadecimal and ASCII formats using TCPDUMP, auditing a hash value and passwords with John the Ripper, listing Nikto plugins, port scanning with Nikto, checking version details, filtering TCPDUMP output by source, listing interfaces, checking port 80 at Wireshark, using OR conditions to check protocols, saving scan results and packet captures to files, checking databases with Nikto, capturing packets without or with only second-level timestamps, and reading a saved packet capture file.
This document outlines 20 tasks for a cyber security end semester lab exam, including pausing a web server scan, showing packet traces in hexadecimal and ASCII formats using TCPDUMP, auditing a hash value and passwords with John the Ripper, listing Nikto plugins, port scanning with Nikto, checking version details, filtering TCPDUMP output by source, listing interfaces, checking port 80 at Wireshark, using OR conditions to check protocols, saving scan results and packet captures to files, checking databases with Nikto, capturing packets without or with only second-level timestamps, and reading a saved packet capture file.