Day 13 — “To the Pots, Through the Walls”
The learning objectives for day 13 were:
Learn to understand incident analysis through the Diamond Model.
Identify defensive strategies that can be applied to the Diamond Model.
Learn to set up firewall rules and a honeypot as defensive strategies.
In this task we had to change the firewall rules to expose the webiste to the public and obtain the flag , here we learned about the default firewall configuration tool available on Ubuntu hosts , we had to enable ufw and we had to configure it allow and deny traffic from ports and ip’s as per the requirements.Later, we were also tasked with creating our very own honeypot using the penTbox tool.
Earlier we were briefed about types of attacks, firewalls, types of firewalls, defensive diamond model , honeypots and their importance.
Two key elements of defensive diamond models are threat hunting and vulnerability management.
A honeypot is a cyber security mechanism — a masterful deception. It presents itself as an alluring target to the adversaries, drawing them away from the true prizes. Honeypots come in various forms: software applications, servers, or entire networks. They are designed to mimic legitimate targets, yet they are under the watchful control of the defender. For the Best Festival Company, envision a honeypot masquerading as Santa’s website — a perfect replica of the real one.
Click here to see the walkthrough.
No comments:
Post a Comment