Lab report

Access to your XP security and Kali virtual machines in the Computer Security Lab. Both of the images have a wide range of security tools. In this lab do a survey of the tools on each of these images. Are they classified a certain way? Can you make any generalizations about the tools you see? Identify 3 tools on each image then explore with greater detail what those tools do and how they might help a security practitioner conduct security actions in a security operations center(SOC)