Soal UAS - Keamanan Jaringan Komputer 1 - Ganjil 2020
Soal UAS - Keamanan Jaringan Komputer 1 - Ganjil 2020
Soal UAS - Keamanan Jaringan Komputer 1 - Ganjil 2020
Addressing Table
The following addresses are preconfigured on the network devices. Addresses are provided for
reference purposes.
e. According to SGUIL, when did the exploit begin? When did it end? Approximately how long
did it take?
Jawab:
f. What is the IP address of the internal computer involved in the events?
Jawab:
g. What is the MAC address of the internal computer involved in the events? How did you find
it?
Jawab:
h. What are some of the Source IDs of the rules that fire when the exploit occurs? Where are the
Source IDs from?
Jawab:
i. Do the events look suspicious to you? Does it seem like the internal computer was infected or
compromised? Explain.
Jawab:
j. What is the operating system running on the internal computer in question?
Jawab:
p. In the context of the events displayed by SGUIL for this exploit, record below the IP
addresses involved.
Jawab:
Ada 2 IP yang terlibat: yaitu web server 192.99.198.158 dan komputer internal 192.168.0.12
q. The first new event displayed by SGUIL contains the message “ET Policy Outdated Flash
Version M1”. The event refers to which host? What does that event imply?
Jawab:
r. According to SGUIL, what is the IP address of the host that appears to have delivered the
exploit?
Jawab:
s. Pivoting from SGUIL, open the transcript of the transaction. What is the domain name
associated with the IP address of the host that appears to have delivered the exploit?
Jawab:
t. This exploit kit typically targets vulnerabilities in which three software applications?
Jawab:
u. Based on the SGUIL events, what vulnerability seems to have been used by the exploit kit?
Jawab:
v. What is the most common file type that is related to that vulnerable software?
Jawab:
w. Use ELSA to gather more evidence to support the hypothesis that the host you identified
above delivered the malware. Launch ELSA and list all hosts that downloaded the type of file
listed above. Remember to adjust the timeframe accordingly.
Were you able to find more evidence? If so, record your findings here.
Jawab:
x. At this point you should know, with quite some level of certainty, whether the site listed in Part
3b and Part 3c delivered the malware. Record your conclusions below.
Jawab:
aa. What is the IP address that delivered the exploit kit and malware payload?
Jawab:
bb. Pivoting from events in SGUIL, launch Wireshark and export the files from the captured
packets as was done in a previous lab. What files or programs are you able to successfully
export?
Jawab:
Dosen Pengampu MK :
2.
Dosen Koordinator :
Ka.Prodi