GitHub / uruc / Active-Directory-Lab
This project sets up an Active Directory environment and configures Splunk to ingest events from a Windows Server and a target machine. We perform a brute force attack using Kali Linux to observe telemetry and use Atomic Red Team for additional testing. Goals: enhance IT administration skills, event monitoring, and threat detection.
JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/uruc%2FActive-Directory-Lab
PURL: pkg:github/uruc/Active-Directory-Lab
Stars: 0
Forks: 0
Open issues: 0
License: mit
Language:
Size: 5.01 MB
Dependencies parsed at: Pending
Created at: about 1 year ago
Updated at: about 1 year ago
Pushed at: about 1 year ago
Last synced at: about 1 year ago
Topics: active-directory, atomic-red-team, mitre-attack, splunk, sysmon