Sunday, October 14, 2018

Lab 12

Lab 12

This lab was a tricky one. I spent a lot of time to get this to work; too much time. The purpose of this lab was to configure a firewall and perform attacks on it.

Exercise 1

This first exercise involved looking at the pfSense web interface. I looked at various things and tested that www.web.local could be tracerouted with the mtr tool (This didn't initially work and required some fiddling with DNS settings on the DC). I also set up logging.





Exercise 2

In this exercise I looked at firewall rule settings. I set up a redirection and a blocking rule on the firewall at viewed the results.







Exercise 3

In this exercise I tested the Suricata tool and saw the results of its logging.







Exercise 4

In this exercise I tested how the firewall would react to a DoS attack. As can be seen in Suricata, the Kali machine that the DoS attack is occuring on is blocked. The firewall does suffer from higher bandwidth and CPU utilization though, so if the DoS attack was strong enough it would use all the resources and stop the firewall from functioning properly. 

I also tested another DoS attack that made the firewall unuseable.

 




Critical Thinking

Looking back on this lab, I spent way too much time trying to get stuff working. Having the forum with other classmates' contributions really helped me get through in the end. It really showed how not everything will work as intended, so you should always be prepared to spend time troubleshooting and problem solving.




No comments:

Post a Comment