Welcome to my GitHub project!
https://bluecapesecurity.com/courses/c2-attack-and-defend/
I am practicing a realistic cyber attack scenario, utilising the Empire Command and Control (C2) framework to carry out an attack on a Windows target VM. This project reflects a true 'purple team' approach, where I learn from both the perspective of a red team operator and a blue team investigator.
- Splunk
- Velociraptor
- Downloaded and Installed Oracle VirtualBox 7.0
- Downloaded and Installed a Windows 10 VM
- Downloaded and Installed a Windows Server 2019 VM
- Installed Active Directory Services on Windows Server 2019
- Active directory services has been installed on the windows Server 2019 and promoted this server to Domain controller. Created the domain name for the lab, appended by the toplevel domain label.local.
- Created domain users
- Intially, there will be one admin account called Administrator. Added additional users for this domain.
- To test the system, check the box for 'Password never expires'.
- Assigned the user to domain administrators.
-
Added the Windows 10 workstation to the domain.