Cyber security

Detection Lab – A Comprehensive Overview Of Its Features, Documentation, And Legacy

This lab has been designed with defenders in mind. Its primary purpose is to allow the user to quickly build a Windows domain that comes pre-loaded with security tooling and some best practices when it comes to system logging configurations.

It can easily be modified to fit most needs or expanded to include additional hosts.

Read more about Detection Lab on Medium

NOTE: This lab has not been hardened in any way and runs with default vagrant credentials.

Please do not connect or bridge it to any networks you care about. This lab is deliberately designed to be insecure; the primary purpose of it is to provide visibility and introspection into each host.

Primary Lab Features:

  • Microsoft Advanced Threat Analytics is installed on the WEF machine, with the lightweight ATA gateway installed on the DC
  • A Splunk forwarder is pre-installed and all indexes are pre-created. Technology add-ons are also preconfigured.
  • A custom Windows auditing configuration is set via GPO to include command line process auditing and additional OS-level logging
  • Palantir’s Windows Event Forwarding subscriptions and custom channels are implemented
  • Powershell transcript logging is enabled. All logs are saved to \\wef\pslogs
  • osquery comes installed on each host and is pre-configured to connect to a Fleet server via TLS. Fleet is preconfigured with the configuration from Palantir’s osquery Configuration
  • Sysmon is installed and configured using Olaf Hartong’s open-sourced Sysmon configuration
  • All autostart items are logged to Windows Event Logs via AutorunsToWinEventLog
  • Zeek and Suricata are pre-configured to monitor and alert on network traffic
  • Apache Guacamole is installed to easily access all hosts from your local browser

For more information click here.

Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

IconJector – Exploiting Windows Explorer With DLL Injection Through Icon Changes

Firstly, a folder is created in the temp directory, and the properties of the folder…

15 hours ago

SharpGraphView – A Modular Toolkit For Advanced Azure Cloud Attacks

Sharp post-exploitation toolkit providing modular access to the Microsoft Graph API (graph.microsoft.com) for cloud and…

16 hours ago

Gungnir : Monitoring Certificate Transparency In Real-Time

Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs…

16 hours ago

Binary Exploitation Notes – Techniques, Resources, And More

Dive into the world of binary exploitation with this comprehensive guide. Whether you're a beginner…

16 hours ago

Awesome-Mobile-CTF : The Ultimate Guide To Mobile Capture The Flag Challenges And Resources

This is a curated list of mobile based CTFs, write-ups and vulnerable mobile apps. Most…

16 hours ago

ArreStats – The Ultimate Tool For Exploring New Jersey’s Arrest Records

In the ever-evolving landscape of data journalism, tools that allow for the exploration of public…

2 days ago