Skip to content

rena-villalba/Detection-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 

Repository files navigation

Detection Lab

Objective

The Detection Lab project aimed to establish a controlled environment for simulating and detecting cyber attacks. The primary focus was to ingest and analyze logs within a Security Information and Event Management (SIEM) system, generating test telemetry to mimic real-world attack scenarios. This hands-on experience was designed to deepen understanding of network security, attack patterns, and defensive strategies.

Skills Learned

  • Advanced understanding of SIEM concepts and practical application.
  • Proficiency in analyzing and interpreting network logs.
  • Ability to generate and recognize attack signatures and patterns.
  • Enhanced knowledge of network protocols and security vulnerabilities.
  • Development of critical thinking and problem-solving skills in cybersecurity.

Tools Used

  • Security Information and Event Management (SIEM) system for log ingestion and analysis.
  • Advanced system monitoring tool (Sysmon) that logs detailed information.

Steps

Pre-Conditions:

  • Configuring the static IP address for both VM's
  • On the Target Machine we have to enable Remote Desktop Procedure (RDP)
  • Also disable Real-Time Protection on Windows Security

Img 1: Network Diagram
Detection Lab

Img 2: Port Scanning from the attacker machine (Reconnaissance)
2 port_scanning

Img 3: Making the payload with the gathered information
3 payload

Img 4: Starting the handler with Metasploit
4 handler_msfconsole

Img 5: Configuring the correct shell and payload options
5 meterpreter_shell

Img 6: Making the temporary http web server
6 temporary_http_server

Img 7: Verifying on the target machine that there is a connection between the two machines
7 ping_attacker

Img 8: Accessing the web server of the attcker machine
fake_http_server

Img 9: Downloading and running the malware
running_malware

Img 10: Checking the established connection to the attacker's station
connection_established

Img 11: Confirming the process "malware" by name and PID
task_manager_processes

Img 12: Checking the Meterpreter shell at the attacker's machine
12 successful_attack

Img 13: Creating a shell and searching for the user information
13 getting_user_info

Img 14: Searching for the group information
14 looking_group_info

Img 15: Searching for the group information
15 looking_ip_info

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published