You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Set up a honeypot in Azure and configured Azure Sentinel workbook to display global attack data (RDP brute force attacks) on a world map.
The logs were collected from Windows Event Viewer on the honeypot and were processed by a third-party API to extract geographic information. The data were then fed to the SIEM using a custom PowerShell script.
The idea is to observe the traffic in the network using promiscuous mode, capture the DNS packets, parse them, build a reply and send it to the client before the authentic DNS server can.
Analyse a windows info stealer malware using OSINT, some PE utilities on REMnux VM and a custom python script using the PEfile library. Then write yara rules to sign off the malware.
This lab aims at using a SIEM (here it's Azure's Sentinel) to map global attacks on a honeypt. The honeypot is simply a vulnerable VM exposed to the internet. The SIEM aggregates the failed DRP log…
This is my first introduction to Active Directory. The goal of this lab is to create a Domain Controller VM which will house the AD services along win10 clients. The DC will have 2 NIC, one connect…