Skip to content

RachHavoc/Final_Project

Repository files navigation

Final Project

This repository includes Red Team Operations, Blue Team Operations, and Network Forensics. All operations were conducted within Azure Labs. The Windows machine's hypervisor allowed the following network topology.

diagram

Red Team Operations

Tools used: Nmap, WP Scan, John the Ripper, and a python script for privilege escalation

The red team operations included network enumeration to identify the target machine, and various tactics to exploit and gain root access to the target machine.

Blue Team Operations

Tools used: ELK Stack

The blue team operations included configuring the Elasticsearch, Logstash, and Kibana (ELK Stack) watcher logs as well as a description of the network topology, alerts configured to monitor the targets, and suggestions for network patches.

Network Forensic Analysis

Tools Used: Wireshark and Virus Total

The network forensics operations included detailed inspection of network traffic in order to identify malicious file downloads.

Detailed summaries of this project are linked below.

Offensive Security Red Team Presentation

About

Red Team, Blue Team, Network Forensic Analysis

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published