Note: There are malware samples included in these labs which is why it was created as an ISO. Contents: # bitfit 1.0.0 output generated on 2015-09-06 12:01:49.143000 by phenry # C:\bitfit.exe e:\SEC501\ # filename,MD5,SHA1 7z920-x64.msi,cac92727c33bec0a79965c61bbb1c82f,4173fea2af9a595fa0be1ef8251f412229687be1 7z920.exe,b3fdf6e7b0aecd48ca7e4921773fb606,55283ad59439134673fc32fc097bdd9ae920fbc6 Day1/192.168.1.2.conf,fb133c98646183aaf24c6eefe1e3c4c7,71264c440b17dfd356e37d9474a1f4c9997e35e7 Day1/192.168.1.2.conf1,8e6898de3b63db8fdcfbabe3678a112f,0ce0b33bcd662f947f23926db25b150fdb02df13 Day1/192.168.1.2.conf2,ad4df6e5b2306681f6e758c4c56cb9f9,fce3566cb86380eae2a9ce9b27b59cb12e5db516 Day1/192.168.1.2.conf3,1d8c2c4d9c37f6d50be277c6a2cb1147,02900e7ca2ee126e74ea478a45447dc55b1d4512 Day1/ActivePerl-5.16.2.1602-MSWin32-x64-296513.msi,6eae7e5851c0b44adf7da64eb3dbea5c,a7e7ad36284b891e5b9060325986f09cb8ad8c5b Day1/ActivePerl-5.16.2.1602-MSWin32-x86-296513.msi,63339975ee5f62c636ca6ced99df9869,df50c98dcc09c650b620decce6caf42940e6046a Day1/ios7decrypt.pl,05c2e403c21682e24f826d4046ebab36,ada9a8d6a9a670a6b3c12526d193da57123ee465 Day1/onceperfect.conf,23b95a727a8b49a3cbd260db16637ae9,972b4a562bf5b3b3ac66247e2a90ad5356e34470 Day1/router-passwords.txt,6735ff15833df68fc70864deba0ffa6f,dbdf8fca308975753b531e14407c64a9ec7699e2 Day1/wrar393.exe,b3b121ccac92a71152d3aa6a783927d4,b51e3dcd8edaad1cb77550a9cfd6266c4925c630 Day2/NetworkMiner_1-4-1.zip,8a1a73acbf0ee2fc02a54e60960ef3fc,bd1c5cbd0b30e878c0858471c2f4f6756fb31df9 Day2/PCAPs/CVE-2003-0533-EvasionTCPSegment163-NetBIOSInitialChaff-OptionChaffGetRequest-SMBResourceSegment33-MSRPCSessionFragment32.pcap,229e241e3080bf6ce757a61a50ab11c1,c58187d2612fa1edb10b96b43706ebb30b34a646 Day2/PCAPs/CVE-2003-0533-EvasionTCPSegment3-SMBDecoyWrites5-SMBResourceSegment33.pcap,29240d0645f13079992d83c12cb64273,83ab77c07979e4f3a729cbf1ef9c23448b4d054d Day2/PCAPs/CVE-2003-0533-EvasionTCPWrappingSequenceNumbers13-TCPSegment4-TCPSegmentOrderRandom-SMBResourceSegment33MSRPCSessionFragment32.pcap,678ebcc5fb5c34e8fa89c209cda6767f,99cab483e7166c9abff2d59fe613908ff031c2f4 Day2/PCAPs/CVE-2008-4250-EvasionNetBIOSChaff-OptionChaffEmptyKeepAlive-SMBResourceSegment33.pcap,43e66fe12533c0828c9ceb43ce960f9d,61a3231e0b05f744cb28460262acaa5c601f2086 Day2/PCAPs/CVE-2008-4250-EvasionNetBIOSChaff-OptionChaffEmptyUnspecified.pcap,c2fef624411af55cc0d9e23377accfda,fb764f02a8aafbcec7efb58f7dc8fa38d587a10d Day2/PCAPs/cve-2008-4250_base.pcap,9be80523c6e02b9b1f8c6ffc2df55b92,6af76e905bfc8c27674541fc6b9673a1aa14de60 Day2/PCAPs/cve-2008-4250_writemode_frag.pcap,be0c2054653fb7c2ea4125c7fd2e77df,2057b42bd1fcf9c7b3d2f8eaef6deeef80cfc675 Day2/PCAPs/dns-remoteshell.pcap,3451fc588eb703545b4ecd26d203acb5,dae771aded9aa708b131cf0de16cb14efb943198 […]
The post SANS SEC501 Enterprise Defender 2016 Labs appeared first on Get Tutorials & Training | Tut4DL.