magarsurajjj-alt/Network-Reconnaissance-Detection-Incident-Response-Lab

GitHub: magarsurajjj-alt/Network-Reconnaissance-Detection-Incident-Response-Lab

模拟 Nmap 网络侦察攻击并演示基于 Windows 防火墙日志进行检测分析与事件响应全流程的 SOC 教学实验室。

Stars: 0 | Forks: 0

# 网络侦察检测与事件响应实验室 SOC 事件响应项目 ## 概述 本项目模拟了一个真实的 SOC(安全运营中心)场景,其中从 Kali Linux 机器上使用 Nmap 执行网络侦察攻击,并使用 Windows 防火墙日志进行检测。随后对该攻击进行了分析,并使用防火墙规则实施了缓解措施。 本项目旨在演示: - 网络侦察检测 - 使用 Windows 防火墙日志进行日志分析 - 事件响应工作流(检测 → 分析 → 响应) - 基于防火墙的缓解技术 ## 实验环境 - 🖥️ 攻击者:Kali Linux - 🖥️ 目标靶机:Windows 11 - 📊 日志记录:Windows 防火墙日志记录 - 🛠️ 使用的工具: - Nmap(网络扫描) - Windows 防火墙 - PowerShell ## 攻击模拟 在 Kali Linux 上使用 Nmap 执行了网络扫描: ``` nmap -sS -sV -T4 192.168.1.67 or aggressive scan: nmap -A 192.168.1.67 This simulates a reconnaissance attack where an attacker tries to discover: Open ports Running services System exposure Tool used: Nmap ## 检测方法 Detection was performed using Windows Firewall logs. Log Location: %systemroot%\System32\LogFiles\Firewall\pfirewall.log Indicators of Reconnaissance: Multiple connection attempts from same IP Sequential port scanning behavior DROP / REJECT entries in logs High frequency TCP SYN requests ## 事件分析 From log analysis, the following were identified: Attacker IP: 192.168.1.71 Targeted Ports: 21, 22, 80, 135, 445, 3389 Behavior: Network reconnaissance (port scanning) ## 事件响应 (缓解) A firewall rule was created to block the attacker: New-NetFirewallRule -DisplayName "Block Nmap Scanner" ` -Direction Inbound ` -RemoteAddress 192.168.1.71 ` -Action Block This successfully stopped further scanning activity. ## 可选分析工具 For deeper analysis: Windows Event Logs Wireshark packet analysis (Wireshark) Splunk dashboards (Splunk) ## 关键学习成果 Understanding reconnaissance attacks (network scanning) Log-based threat detection SOC incident response workflow Firewall-based threat mitigation Basic Blue Team security operations ## 结论 This project demonstrates how SOC analysts detect and respond to reconnaissance attacks using log analysis and firewall controls. It simulates a real-world attack scenario and shows the full incident response lifecycle: detection, analysis, and mitigation. ```
标签:AI合规, AMSI绕过, CTI, IPv6, Nmap, PowerShell, Windows 11, Windows防火墙, Wireshark, 句柄查看, 威胁检测, 子域名变形, 安全实验, 安全运营中心, 实验室环境, 密码管理, 库, 应急响应, 插件系统, 攻击模拟, 数据统计, 端口扫描, 缓解措施, 网络侦察检测, 网络安全, 网络映射, 虚拟驱动器, 防御策略, 隐私保护, 驱动签名利用