Skip to content

In this project I am documenting all my learning from Blue Cape Security's C2 Attack & Defend DIY Course

Notifications You must be signed in to change notification settings

shimsha24/C2-Attack-Defend

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 

Repository files navigation

C2-Attack-Defend

Welcome to my GitHub project!

This is the free course from Blue Cape Security's 'C2 Attack & Defend DIY Course.'

https://bluecapesecurity.com/courses/c2-attack-and-defend/

Objective

I am practicing a realistic cyber attack scenario, utilising the Empire Command and Control (C2) framework to carry out an attack on a Windows target VM. This project reflects a true 'purple team' approach, where I learn from both the perspective of a red team operator and a blue team investigator.

Skills Learned

Tools Used

  • Splunk
  • Velociraptor

Steps

  • Downloaded and Installed Oracle VirtualBox 7.0
  • Downloaded and Installed a Windows 10 VM
  • Downloaded and Installed a Windows Server 2019 VM
  • Installed Active Directory Services on Windows Server 2019
    • Active directory services has been installed on the windows Server 2019 and promoted this server to Domain controller. Created the domain name for the lab, appended by the toplevel domain label.local.

image

  • Created domain users
    • Intially, there will be one admin account called Administrator. Added additional users for this domain.
    • To test the system, check the box for 'Password never expires'.
    • Assigned the user to domain administrators.

image

image

  • Added the Windows 10 workstation to the domain.

    Fixing duplicate IP address issue with Virtual Box

About

In this project I am documenting all my learning from Blue Cape Security's C2 Attack & Defend DIY Course

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published