Configuring the detection lab
Before we start the practical exercises in this chapter, we need to prepare our work environment.
To begin, start up the virtual machines that we will use throughout this chapter. To do this, start VMware Workstation Player. From there, do the following:
- Start the IR-Laptop virtual machine and sign in using the following credentials:
- Username:
investigator
- Password:
L34rn1ng!
- Username:
- Start the IR-Workstation virtual machine and sign in using the following credentials:
- Username:
investigator
- Password:
L34rn1ng!
- Username:
Once you have started both virtual machines, you can install and configure the tools that will be required to perform the practical lab exercises.
Implementing a threat hunting platform
In the previous chapter, you learned about some basic concepts for using the monitoring, detection, incident response, and orchestration Security Onion platform. As you learned, this platform contains valuable tools for active defense against threats...