Back to all projects





57133923
Part 2: Generating Telemetry and Analyzing Attacks
2024-11-23
Samson Otori
Personal Project
Blue Team

Challenge
Generate and analyze telemetry data to detect malicious activities.
Solution
Used Nmap for reconnaissance, Metasploit for attack simulation, and Splunk for log analysis.
Results
- Successfully generated attack telemetry
- Implemented attack detection capabilities
- Gained hands-on experience with security tools
Project Gallery

Blue Team
Home Lab
SIEM
Nmap
Metasploit
Python
Splunk
Continue Reading
PreviousProject 1: Building a Cybersecurity Home Lab · Part 1 of 2

Part 1: Setting Up My Virtual Home Lab Environment
Establishing a home lab to gain hands-on experience in cybersecurity.
Nov 8, 2024
Read previous
NextProject 3: 30-Day MYDFIR SOC Analyst Challenge · Part 23 of 30

Part 23: Understanding and Implementing a Ticketing System
Day 23 of the 30-Day MYDFIR SOC Analyst Challenge: Exploring ticketing systems and their crucial role in tracking security alerts and manag…
Nov 23, 2024
Read next
Related Projects
Oldest Projects
Newest Projects

Blue Team
Project 6.0: LOG(N) Pacific Internship – Vulnerability Management: Windows Authenticated vs Unauthenticated Scanning with Tenable
Nov 21Project

Blue Team
Project 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario (Part 2: The Threat Hunt)
Nov 17Project

Blue Team
Project 5.9: LOG(N) Pacific Internship Final Project – Detecting Tor Browser Usage on Corporate Endpoint - Threat Hunting Scenario (Part 1: Malicious Activity Simulation)
Nov 17Project
Project Categories
All
Cloud
Blue Team
Red Team
Infrastructure

