GithubHelp home page GithubHelp logo

soojilee88 / -uoft-cybersecurity_project3 Goto Github PK

View Code? Open in Web Editor NEW
1.0 1.0 2.0 50.38 MB

Attack, Defense & Analysis of a Vulnerable Network

Shell 100.00%
blueteam cybersecurity defensive-security offensive-security redteam wireshark

-uoft-cybersecurity_project3's Introduction

Final Project

Overview

You are working as a Security Engineer for X-CORP, supporting the SOC infrastructure. The SOC analysts have noticed some discrepancies with alerting in the Kibana system and the manager has asked the Security Engineering team to investigate.

To start, your team needs to confirm that newly created alerts are working. Once the alerts are verified to be working, you will monitor live traffic on the wire to detect any abnormalities that aren't reflected in the alerting system.

You will then report back all your findings to both the SOC manager and the Engineering Manager with appropriate analysis.


Red Team Analysis

Pentesting Target 1 & Target 2

  • Assess a vulnerable VM and verify that the Kibana rules work as expected.

  • Within this analysis, critical vulnerabilities are exposed of the vulnerable VM, and is shown step by step of how the pentesting has worked to gain access to each system.

  • Offensive Analysis can be accessed here: OffensiveTemplate


Blue Team Analysis

Hardening of vulnerable VM

  • Implement alerts and thresholds that are determined to be effective.

  • This analysis contains Network Topology, description of targets, and how the monitoring of the targets are set so that the ELK can be utilized to specific point of alerts. Hardening of the systems are also shown with detailed explanation.

  • Defensive Analysis can be accessed here: DefensiveTemplate


Network Analysis

Normal Activity vs Malicious Activity

  • Use Wireshark to analyze live malicious traffic on the wire

  • By looking at the packets within the network, found the targets whom have created custom site on the network, also found the infected machine and what they are infected with, and also found illegal downloads that were downloaded to the network.

  • Network Analysis can be accessed here: NetworkTemplate


Presentation

  • Group PowerPuff

  • Decided to present Offensive side of the Project.

  • Presentation Slides can be found here: PresentationSlides




Author

My name is Sooji Lee :)

-uoft-cybersecurity_project3's People

Contributors

soojilee88 avatar

Stargazers

 avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.