Overview
This project showcases offensive and defensive workflows side-by-side. Each lab demonstrates an attack technique followed by practical detection and mitigation steps—highlighting both attacker mindset and defender tradecraft.
Labs
Lab 1 — SSH Brute Force Attack
Simulates brute forcing SSH, then detecting the attack and hardening to resist future attempts.
Lab 2 — Successful Brute Force Login
Examines what happens after compromise, including detection of unauthorized access and recovery steps.
Lab 3 — Privilege Escalation
Exploits a deliberate binary misconfiguration to escalate privileges, with detection and remediation.
Lab 4 — Persistence
Demonstrates one method to maintain access, plus ways to detect and evict it.
Objectives
- Hands-on Demonstrations: Clear, step-by-step attack and defense scenarios.
- Educational Insights: Explanations of techniques and mitigations per lab.
- Presentation of Findings: Wrap-up reporting in a professional format.