Cybersecurity Labs - Module 4

Master SIEM operations, vulnerability management, and incident response with advanced security operations labs.

These Labs Cover All Cybersecurity Certifications

CompTIA Security+CompTIA CySA+CompTIA PenTest+CompTIA SecurityXISC2 CISSPISC2 SSCPISC2 CCSPISC2 CGRC
ISC2 CSSLPISC2 ISSAPISC2 ISSEPISC2 ISSMPISACA CISAISACA CISMISACA CRISCISACA CDPSE

Security Operations & Incident Response Labs

Develop expertise in SIEM, vulnerability assessment, and incident response procedures.

Lab 10: SIEM Log Analysis & Correlation
Terminal
CySA+
Scenario: Detect Security Threats
TechCorp's SOC detected unusual activity. Configure Splunk SIEM to ingest authentication logs, create correlation rules for brute force detection, and investigate a multi-stage attack.

Learning Objectives:

  • Configure SIEM log ingestion and parsing
  • Create correlation rules for threat detection
  • Investigate security incidents using SPL queries

Step-by-Step Instructions

  1. Step 1: Install Splunk Enterprise
    🎯 Goal: Deploy Splunk SIEM platform for log aggregation

    📝 Why This Matters:
    SIEM (Security Information and Event Management) is the central nervous system of security operations. It collects logs from all systems and correlates them to detect attacks spanning multiple sources. Without SIEM, attacks go undetected because no single log shows the full picture.

    💻 Command:
    sudo apt install splunk

    🔍 What This Does:
    • Downloads and installs Splunk package
    • Creates /opt/splunk directory structure
    • Sets up web interface on port 8000
    • Initializes indexing and search engine
    💡 Production Tip: Splunk requires high disk I/O. Plan 1TB+ storage per day of log retention.
  2. Step 2: Start Splunk Service
    🎯 Goal: Launch the Splunk daemon and web interface

    📝 Why This Matters:
    Splunk runs as a background service that continuously indexes logs as they arrive. Starting the service initializes search heads, indexers, and forwarders that make up the distributed architecture.

    💻 Command:
    sudo systemctl start splunk

    🔍 Architecture Components:
    • Search Head - User interface and queries
    • Indexers - Store and index log data
    • Forwarders - Collect logs from sources
    • Deployment Server - Manages configs
    🎓 Exam Tip: Universal Forwarders are lightweight agents. Heavy Forwarders parse logs before sending.
  3. Step 3: Configure Log Forwarder
    🎯 Goal: Set up Universal Forwarder to send auth logs

    📝 Why This Matters:
    Forwarders are agents deployed on monitored systems. They tail log files and send events to indexers. This distributed architecture scales to millions of endpoints without overwhelming the SIEM.

    💻 Command:
    splunk add forward-server localhost:9997

    🔍 Forwarder Configuration:
    • Port 9997 = Splunk-to-Splunk protocol
    • Compresses and encrypts data in transit
    • Can buffer locally if indexer is down
    • Sends logs in near real-time (5s delay)
    ⚠️ Security: Enable SSL for forwarder communication. Use splunk add forward-server -ssl in production.
  4. Step 4: Add Authentication Logs
    🎯 Goal: Ingest Linux auth logs for security monitoring

    📝 Why This Matters:
    Authentication logs (/var/log/auth.log) record every login attempt - success and failure. Critical for detecting brute force, credential stuffing, and unauthorized access. CySA+ heavily tests auth log analysis.

    💻 Command:
    splunk add monitor /var/log/auth.log -sourcetype linux_auth

    🔍 Key auth.log Fields:
    • Timestamp - When login occurred
    • User - Account attempting access
    • Source IP - Origin of connection
    • Result - success, failed, timeout
    • Service - ssh, su, sudo, login
    💡 Best Practice: Set sourcetype correctly! It determines how Splunk parses logs. Wrong sourcetype = broken fields.
  5. Step 5: Create Correlation Rule
    🎯 Goal: Detect brute force with 5+ failed logins in 5 minutes

    📝 Why This Matters:
    Single failed logins are normal (typos happen). But 5+ failures quickly indicates automated attack or credential stuffing. Correlation rules identify patterns across multiple events - SIEM's real power.

    💻 Command:
    splunk add alert 'failed_logins' 'sourcetype=linux_auth action=failure | stats count by user | where count>=5'

    🔍 SPL Query Breakdown:
    sourcetype=linux_auth - Filter to auth logs
    action=failure - Only failed logins
    stats count by user - Count per username
    where count>=5 - Threshold trigger
    🎓 CySA+ Tip: Know correlation patterns: threshold (count), trending (baseline deviation), sequence (multi-stage).
  6. Step 6: Search for Security Events
    🎯 Goal: Query Splunk to investigate the brute force attack

    📝 Why This Matters:
    When alerts fire, analysts investigate context: Who was targeted? From where? What happened next? SPL (Search Processing Language) is how you ask these questions - it's SQL for security logs.

    💻 Command:
    splunk search 'sourcetype=linux_auth action=failure user=admin | table _time, src_ip, user'

    🔍 Investigation Approach:
    • Identify attack timeline (first/last event)
    • Enumerate source IPs (single or distributed?)
    • Check if attack succeeded (successful login?)
    • Look for lateral movement (other systems?)
    • Correlate with firewall/IDS logs
    💡 Pro Tip: Use | reverse to show oldest events first when investigating attack timelines.
Ubuntu 22.04 - Splunk Enterprise
Ubuntu 22.04 LTS - SIEM Lab Environment *** Splunk Enterprise is NOT installed *** Configure SIEM for threat detection and log correlation. Type commands EXACTLY as shown (case-sensitive).
soc@splunk:~$
Progress: 0/6
Score: 0/100
Lab 11: Vulnerability Assessment & Remediation
GUI-Based
SecurityX
Scenario: Identify and Patch Vulnerabilities
TechCorp needs a vulnerability management program. Use Nessus to scan the network, prioritize critical vulnerabilities using CVSS scores, and generate a remediation report for leadership.

Learning Objectives:

  • Configure authenticated vulnerability scans
  • Analyze CVSS scores and prioritize remediation
  • Generate executive-level vulnerability reports

GUI Step-by-Step Instructions

  1. Step 1: Create Scan Policy
    🎯 Goal: Configure an authenticated network scan with best-practice settings

    📝 Why This Matters:
    Scan policies determine what Nessus checks. Unauthenticated scans only see external services - missing 70% of vulnerabilities! Authenticated scans log into systems to check patch levels and configurations. SecurityX requires understanding credentialed vs non-credentialed scans.

    💻 Actions:
    1. Click "Create Scan Policy"
    2. Policy Name: TechCorp-Authenticated-Scan
    3. Scan Template: Authenticated Credentialed Scan
    4. Port Range: 1-65535
    5. Scan Intensity: Select any option
    6. Performance: Select any option
    7. Check Enable Safe Checks
    8. Click "Create Policy"

    🔍 Authenticated Scan Benefits:
    • Detects missing patches
    • Checks local configurations
    • Identifies privilege escalation risks
    • Much lower false positive rate
    ⚠️ Critical: NEVER run unsafe checks in production without maintenance window. Some tests crash services!
  2. Step 2: Add Target Systems
    🎯 Goal: Define IP ranges and credentials for scanning

    📝 Why This Matters:
    Vulnerability management only works if you scan ALL assets. Unscanned systems are where attackers hide. Organizations use CMDB to track every IP, then scan systematically.

    💻 Actions:
    1. Click "Add Targets"
    2. Target Type: Select CIDR Notation
    3. Credential Type: Select SSH
    4. Target Specification: 192.168.1.0/24
    5. Scan Schedule: Select Run Immediately
    6. Asset Priority: Select any option
    7. SSH Username: scanner
    8. SSH Auth Method: Select Password
    9. SSH Password: Scan123!
    10. Privilege Escalation: Select sudo
    11. Click "Add Target"

    🔍 Target Discovery Methods:
    • Static IP ranges (data center)
    • DHCP logs (dynamic IPs)
    • Active Directory queries (Windows)
    • Cloud APIs (AWS/Azure instances)
    💡 Best Practice: Use dedicated scanner accounts with read-only privileges. Never scan with Domain Admin!
  3. Step 3: Execute Vulnerability Scan
    🎯 Goal: Launch the scan and wait for completion

    📝 Why This Matters:
    The scan connects to targets, logs in, enumerates software, and compares against Tenable's vulnerability database (150,000+ plugins). Full network scans can run hours - plan during low-traffic periods.

    💻 Actions:
    1. Click "Launch Scan" button
    2. Confirm scan start
    3. Monitor progress bar
    4. Wait for "Scan Complete"

    🔍 What Nessus Does:
    • Port scan to find services
    • Banner grabbing for versions
    • SSH login to check patches
    • Configuration audits
    • Exploit checks (safe mode)
    🎓 SecurityX Tip: Credentialed scans: 1-2 hours per 100 hosts. Non-credentialed: 15-30 minutes per 100.
  4. Step 4: Analyze CVSS Scores
    🎯 Goal: Review results and prioritize by severity

    📝 Why This Matters:
    Organizations can't patch everything at once. CVSS (Common Vulnerability Scoring System) provides standardized severity ratings (0-10). SecurityX focuses on risk-based vulnerability management: patch Critical first, Low last.

    💻 Actions:
    1. Click "View Results" button
    2. Review vulnerability counts by severity:
    • Critical (9.0-10.0): Remote code execution
    • High (7.0-8.9): Privilege escalation
    • Medium (4.0-6.9): Info disclosure
    • Low (0.1-3.9): Minor leaks
    3. Sort by CVSS score (highest first)

    🔍 CVSS Factors:
    • Attack Vector (Network > Local)
    • Complexity (Low > High)
    • Privileges Required (None > High)
    • User Interaction (None > Required)
    💡 Real-World: Adjust CVSS with environmental metrics! Web server vuln is Critical, same vuln on offline test system is Low.
  5. Step 5: Review Remediation Steps
    🎯 Goal: Understand how to fix each vulnerability

    📝 Why This Matters:
    Finding vulnerabilities is half the job. Nessus provides actionable remediation: which patch, what config change, or how to mitigate if no patch exists. Critical for closing vulnerability windows quickly.

    💻 Actions:
    1. Click a vulnerability (e.g., OpenSSL RCE)
    2. Read Description - what the flaw is
    3. Read Solution - exact fix
    4. Check References - CVE, vendor advisory
    5. Note Plugin ID - for tracking

    🔍 Remediation Methods:
    • Patch: Apply vendor update (preferred)
    • Upgrade: Move to safe version
    • Workaround: Config change to mitigate
    • Compensating Control: Firewall, IPS
    • Accept Risk: Document why not fixing
    ⚠️ Important: Test patches in staging before production! Patches occasionally break applications.
  6. Step 6: Generate PDF Report
    🎯 Goal: Create executive summary report

    📝 Why This Matters:
    Technical scan data doesn't resonate with executives. They need business context: How many vulnerabilities? What's the risk? PDF reports translate technical findings into business language for decision-makers and compliance auditors.

    💻 Actions:
    1. Click "Generate Report"
    2. Review report sections
    3. Click "Download PDF"
    4. Report saves to Downloads

    🔍 Report Audiences:
    • Executive: Risk summary, business impact
    • Technical: CVEs, remediation steps
    • Compliance: PCI/HIPAA findings
    • Trending: Month-over-month reduction
    🎓 SecurityX Tip: Include metrics! "Reduced Critical vulns from 45 to 12 (73%)" beats "Fixed vulnerabilities."
  7. Step 7: Report Analysis Questions

    Question 1 of 3:
    📄 Download and analyze the Vulnerability Assessment Report PDF carefully before answering these certification-focused questions.

    Question 1: According to CVSS v3.1 scoring methodology used in the report, which factor combination results in the HIGHEST base score for a vulnerability?

  8. Question 2 of 3:
    Question 2: The vulnerability assessment report shows 8 Critical and 15 High severity findings. Per CompTIA SecurityX best practices for vulnerability management, what should be your FIRST remediation priority?

  9. Question 3 of 3:
    Question 3: The report indicates authenticated credentialed scans were used. Why is this methodology critical for accurate vulnerability assessment in enterprise environments?

Nessus Vulnerability ScannerTechCorp Vulnerability Management

Scan Policy

Not Created

Type: -

Targets

IP Range: -

Credentials: Not Set

Scan Status

Not Started

Progress: 0%

Vulnerabilities

Critical: 0

High: 0

Medium: 0

Activity Log
TimestampActionDetailsStatus
No activity yet
Progress: 0/7
Score: 0/100
Lab 12: Security Incident Response
GUI-Based
CISSP
Scenario: Respond to Ransomware Attack
Ransomware detected at TechCorp! Follow the NIST SP 800-61 incident response lifecycle: detect, contain, eradicate, recover, and document lessons learned for compliance and continuous improvement.

Learning Objectives:

  • Execute incident response following NIST framework
  • Perform containment and eradication actions
  • Document incidents for post-mortem analysis

GUI Step-by-Step Instructions

  1. Step 1: Create Incident Ticket
    🎯 Goal: Document the ransomware detection in IRTOOL

    📝 Why This Matters:
    Incident response starts with documentation. Every action, timestamp, and decision must be recorded for legal/forensic purposes. If this ends up in court, your IR ticket is exhibit A. CISSP Domain 7 emphasizes proper incident handling.

    💻 Actions:
    1. Click "Create Incident"
    2. Incident Title: Ransomware Detection - Finance Dept
    3. Incident Category: Select Malware/Ransomware
    4. Severity/Priority: Select P1 - Critical
    5. Business Impact Score: Select Critical
    6. Affected Business Unit: Select Finance
    7. Affected Users: Enter any number (e.g., 25)
    8. Detection Source: Select any option
    9. Assigned To: Select any option
    10. Description: Ransomware encrypting files on fileserver01
    11. Click "Create Incident"

    🔍 Severity Criteria:
    • Critical: Active destruction, ransomware, breach
    • High: Compromised servers, privilege escalation
    • Medium: Contained malware, phishing attempt
    • Low: Policy violation, suspicious activity
    ⚠️ Legal Warning: Preserve all evidence! Don't delete logs or shut down systems without consulting legal/forensics.
  2. Step 2: Assess Impact Scope
    🎯 Goal: Determine infected systems and data at risk

    📝 Why This Matters:
    You can't contain what you can't see. Impact assessment identifies patient zero, lateral movement paths, and data exposure. Is it 1 laptop or 100 servers? CISSP requires understanding business impact analysis in IR.

    💻 Actions:
    1. Click "Assess Impact"
    2. Affected Systems Count: 3
    3. Estimated Records Affected: 50000
    4. System Types Affected: Select any options
    5. Data Types Compromised: Select any options
    6. Data Classification: Select Confidential
    7. Estimated Financial Impact: Select any option
    8. Compliance/Regulatory Impact: Select any options
    9. Service Availability Status: Select any option
    10. Click "Save Assessment"

    🔍 Impact Questions:
    • How many systems infected? (scope)
    • What data exposed? (confidentiality)
    • Are systems operational? (availability)
    • Data exfiltrated? (breach notification)
    • Financial impact? (business impact)
    🎓 CISSP Tip: Know data classification! Public > Internal > Confidential > Secret. Different breach notification requirements apply.
  3. Step 3: Execute Containment
    🎯 Goal: Isolate infected systems to stop spread

    📝 Why This Matters:
    Containment is the emergency brake. Every minute ransomware runs, more files encrypt. Network isolation stops lateral movement immediately. NIST SP 800-61 defines containment as critical second phase after detection.

    💻 Actions:
    1. Click "Contain Threat"
    2. Primary Containment Method: Select Network Isolation
    3. Scope of Containment: Select any option
    4. Secondary Containment Actions: Select any options
    5. Notification Required: Select any options
    6. Evidence Preservation: Select any option
    7. Check both confirmation boxes
    8. Click "Execute Containment"

    🔍 Containment Strategies:
    • Network Isolation: Disconnect from LAN (fast)
    • Firewall Rules: Block specific IPs (surgical)
    • VLAN Quarantine: Isolated VLAN (forensics)
    • Account Disable: Block credentials
    • System Shutdown: Last resort (loses RAM)
    💡 Best Practice: Don't power off! You lose RAM evidence (processes, encryption keys). Isolate network first, then image.
  4. Step 4: Eradicate Malware
    🎯 Goal: Remove ransomware and close initial access

    📝 Why This Matters:
    Containment stops bleeding, eradication fixes the wound. Remove ALL malware artifacts (executables, scheduled tasks, registry) and patch the vulnerability that allowed entry. Skip this and ransomware returns in hours.

    💻 Actions:
    1. Click "Eradicate"
    2. Primary Eradication Method: Select Full System Re-image
    3. Malware/Threat Artifacts: ransomware.exe, scheduled tasks, registry keys
    4. Vulnerability Remediation: Select any options
    5. Post-Eradication Validation: Select any options
    6. Root Cause Analysis: Unpatched RDP service exposed to internet
    7. Additional Hardening: Patch RDP vulnerability, reset credentials
    8. Click "Execute Eradication"

    🔍 Eradication Methods:
    • Re-imaging: Wipe and rebuild (cleanest)
    • AV Removal: Automated (fast, may miss)
    • Manual Removal: Hunt IOCs (thorough)
    • Patch Vulnerabilities: Close entry point
    • Password Resets: Revoke credentials
    ⚠️ Critical: Patch BEFORE reconnecting to network! Otherwise, instant re-infection.
  5. Step 5: Recover Systems
    🎯 Goal: Restore systems from clean backups

    📝 Why This Matters:
    Recovery is why you have backups! Restore from last known-good backup BEFORE infection. Verify backups aren\'t corrupted or encrypted. Many ransomware strains target backups first. CISSP covers BCP/DR integration with IR.

    💻 Actions:
    1. Click "Recover Systems"
    2. Primary Restoration Method: Select Full Backup Restore
    3. Backup Source: Select any option
    4. Backup Date/Time: Select a date
    5. Service Restoration Priority: Select any option
    6. Recovery Point Objective: 4 hours
    7. Recovery Time Objective: 8 hours
    8. Data Integrity Validation: Select any options
    9. Post-Recovery Testing: Select any options
    10. User Communication Plan: Email notification to all users about service restoration
    11. Check all three confirmation boxes
    12. Click "Restore Systems"

    🔍 Recovery Validation:
    • Systems boot normally
    • Data integrity verified (checksums)
    • Business apps functional
    • No malware artifacts remain
    • Monitor 24-48 hours for re-infection
    💡 3-2-1 Backup Rule: 3 copies, 2 different media, 1 offsite/offline. Ransomware can't encrypt what it can't reach!
  6. Step 6: Generate Incident Report
    🎯 Goal: Create post-incident report for leadership

    📝 Why This Matters:
    The incident report documents what happened, how you responded, and lessons learned. Required for compliance (GDPR 72-hour notification, HIPAA, PCI-DSS), insurance claims, and continuous improvement. Poor post-mortems lead to repeat incidents.

    💻 Actions:
    1. Click "Generate Report"
    2. Review report sections
    3. Click "Download PDF"
    4. Report saves for compliance/audit

    🔍 Lessons Learned Meeting:
    • What worked well? (celebrate wins)
    • What didn't work? (no blame, fix process)
    • What should we change? (actionable items)
    • How prevent recurrence? (long-term fixes)
    🎓 CISSP Tip: Know breach notification timelines! GDPR = 72 hours, US states = "reasonable time", PCI = immediately.
  7. Step 7: Report Analysis Questions

    Question 1 of 3:
    📄 Download and analyze the Incident Response Report PDF carefully before answering these CISSP-focused questions.

    Question 1: According to NIST SP 800-61 incident response lifecycle documented in the report, what is the PRIMARY purpose of the "Lessons Learned" phase?

  8. Question 2 of 3:
    Question 2: The incident report shows a 4-hour Recovery Point Objective (RPO) and 8-hour Recovery Time Objective (RTO). What do these metrics mean for business continuity?

  9. Question 3 of 3:
    Question 3: The report documents network isolation as the primary containment strategy. Per CISSP Domain 7, why is this preferred over immediately powering off infected systems?

Incident Response PlatformTechCorp IRTOOL - NIST SP 800-61

Incident Ticket

Not Created

Severity: -

Impact Scope

Systems: -

Data: -

Response Status

Contained: No

Eradicated: No

Recovered: No

Time Tracking

Detected: -

Contained: -

Resolved: -

Incident Timeline
TimestampPhaseActionStatus
No incident activity yet
Progress: 0/7
Score: 0/100