This project showcases offensive and defensive workflows side-by-side. Each lab demonstrates an attack technique followed by practical detection and mitigation steps—highlighting both attacker mindset and defender tradecraft.
Labs
Lab 1: SSH Brute Force Attack — Simulates brute forcing SSH, then detecting the attack and hardening to resist future attempts.
Lab 2: Successful Brute Force Login — Examines what happens after compromise, including detection of unauthorized access and recovery steps.
Lab 3: Privilege Escalation — Exploits a deliberate binary misconfiguration to escalate privileges, with detection and remediation.
Lab 4: Persistence — Demonstrates one method to maintain access, plus ways to detect and evict it.
Objectives
Hands-on Demonstrations: Clear, step-by-step attack and defense scenarios.
Educational Insights: Explanations of techniques and mitigations per lab.
Presentation of Findings: Wrap-up reporting in a professional format.