Virtual Firewall Deployment with pfSense Home Lab
Brief Summary In this project the goal is to learn more about configuring firewalls and how they are deployed within enterprise environments. I’ll be mocking an example network with two subnets, ...
Brief Summary In this project the goal is to learn more about configuring firewalls and how they are deployed within enterprise environments. I’ll be mocking an example network with two subnets, ...
Initial Enumeration Starting with an nmap scan of the machine: nmap -p- 10.10.11.143 We discover 3 open ports: 22 SSH 80 HTTP 443 HTTPS Visiting port 80 in our web browser shows us a t...
Initial Enumeration Connectivity Check Sent a ping to 10.10.10.245 to verify the machine was online. Basic Nmap Scan Ran a basic Nmap scan: nmap 10.10.10.245 Identified open ports: FTP (...
To begin the sherlock we are given the following scenario: “In this very easy Sherlock, you will familiarize yourself with Unix auth.log and wtmp logs. We’ll explore a scenario where a Confluence ...
Question 1 To begin this lab, we’ll first read over the README in the ‘start here’ directory. From this we gather the following information about the scenario We are a cybersecurity analyst fo...
Demo Brief Summary For this project we’ll be using Wazuh for our SIEM and EDR tool, Shuffle for our SOAR tool, and TheHive for case management. Here’s the setup diagram which may be slightly co...
Scenario, a small-sized start-up with remote employees wants to ensure they meet certain security standards while enabling seamless access to company resources. They need a solution to allow this. ...
Brief summary I decided on doing this project to deepen my understanding of securing and monitoring Microsoft Active Directory (AD). I wanted to improve my understanding due to the fact of how wid...