Assets and attacks prevention, detection, and deterrence

Intrusion detection (Exercise 4.16)

This lab demonstrates use of an intrusion detection system to detect malicious behavior such against vulnerable services, applications, the host system etc. We use a tool called snort. Exercise done in pairs i.e attacker+defender.

Report:

Alternative version of this lab is on this page.

Attack surface reduction (Exercise 4.6)

This exercise demonstrates attack surface reduction i.e. limiting access to services and functionality that are not currently being used.

Report:

Alternative version of this lab is on this page.