A progressive, hands-on series of cybersecurity labs built in a controlled virtual environment covering reconnaissance, enumeration, exploitation, and defense.
| # | Lab | Status |
|---|---|---|
| 01 | Network Setup & Nmap Scanning | ✅ Complete |
| 02 | SSH Brute Force Attack & Log Analysis | ✅ Complete |
| 03 | Network Traffic Analysis using Wireshark | ✅ Complete |
| 04 | Preventing SSH Brute Force Attacks using Fail2Ban | ✅ Complete |
| 05 | Detecting Port Scanning using Nmap and Wireshark | ✅ Complete |
| 06 | Detect and Block Port Scanning using UFW + Fail2Ban | ✅ Complete |
| 07 | Web Attack Detection using Apache Logs | ✅ Complete |
| 08 | Real-Time Log Alerting using Apache Logs | ✅ Complete |
| 09 | Reverse Shell Detection using Network and Process Monitoring | ✅ Complete |
| 10 | Coming Soon | 🔜 Upcoming |
- Hypervisor: VMware Fusion
- Machines: Kali Linux · Ubuntu · Windows 11
- Network: Host-only + NAT
All labs are conducted in a controlled virtual environment for educational purposes only.
Do not replicate these techniques on any network or system without explicit authorization.
🛡️ Built for learning. Designed for defenders.