15-3 Lab Writing Custom Rules Network Security FundamentalsSouthern New Hampshire UniversityIT 643 09:39:38 GMT -05:00In this lab, I learned how to work with Snort and write custom rules for it to use while analyzing packet captures.The first assigned task in the lab was to view when “The Hacker Enters The Network - Step 36 - Telnet Alerts from Alert.ids Fileâ€. In this exercise, I used skills from lab 5-2 to run tcpdump, bruter, and snort to find and disable a compromised username and password on the network.Figure 1: Step 36 - Telnet Alerts from Alert.ids File (Infosec, 2024).The second assigned task was “Writing Custom Rules - Step 5 - Third Custom Rule Changeâ€. In this section, I learned how to open and edit the rules for Snort to follow when it analyzes a capture.Figure 2: Step 5 - Third Custom Rule Change (Infosec, 2024). 09:39:38 GMT -05:00The third assigned task was “The Hacker Triggers Alerts - Step 13 - Hash Dumpâ€. In this section, I learned how us fgdump and view the password hashes produced.Figure 3: Step 13 - Hash Dump (Infosec, 2024)The fourth assigned task was “The Hacker Triggers Alerts - Step 17 -