NAS Security Attack & Defense Lab
View this project on GitHub
Welcome to the NAS Security Attack & Defense Lab demonstration. This project is designed to showcase hands-on scenarios involving both offensive and defensive cybersecurity techniques. Through four structured lab exercises, I present simulated attacks and corresponding mitigation strategies to provide a comprehensive understanding of different threats and how to counteract them effectively.
This lab serves as an opportunity to demonstrate my ability to think critically, analyze security risks, and implement practical solutions. It reflects my passion for exploring both red and blue team activities, emphasizing the importance of understanding the mindset of attackers while building strong defenses.
Overview of the Labs:
- Lab 1: SSH Brute Force Attack
Demonstrates a method of how attackers perform brute force attacks in attempt to compromise SSH services. Followed by steps to detect the attack in progress and implement defensive measures to harden the system against future attempts.
- Lab 2: Successful Brute Force Login
Outlines what happens when a brute force attack succeeds in accessing a system. Followed by steps to detect unauthorized logins, respond effectively, and mitigate vulnerabilities to prevent reoccurrence.
- Lab 3: Privilege Escalation
A purposely set misconfiguration is exploited in an executable program binary to carry out a successful privilege escalation. Followed by steps to detect and mitigate.
- Lab 4: Persistence
One of several persistence techniques is demonstrated to maintain ease of access to the system. Followed by steps to detect and mitigate.
Lab Objectives:
- Hands-on Demonstrations: Each lab goes through different attack scenarios and provides step-by-step defenses.
- Educational Insights: Clear explanations of attack methods and mitigation techniques pertaining to each scenario.
- Presentation of Findings: Writing a professional penetration tester or cybersecurity analyst report to finalize the presentation after showcasing each lab.
The following are the detailed Attack & Defense Labs 1 through 4, along with the analysis and reporting documentation.
Lab 1 - SSH Brute Force Attack
Lab 2 - Successful Brute Force Login
Lab 3 - Privilege Escalation
Lab 4 - Persistence
Analysis & Reporting
Back to Lab Projects