Skip to content

Jays1115/Vandalay-Industries-Is-Under-Attack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 

Repository files navigation

Directory

Tech Portfolio Home

Vandalay Industries Is Under Attack

Part 1 Description

Scenerio: As the worldwide leader of importing and exporting, Vandalay Industries has been the target of many adversaries attempting to disrupt their online business. Recently, Vandalay has been experiencing DDOS attacks against their web servers. Not only were Vandalay web servers taken offline by a DDOS attack, but upload and download speed were also significantly impacted after the outage.

Assignment: Create a report to determine the impact of the DDOS attack on upload and download speed. Create an additional field to calculate the ratio of the upload speed to the download speed.

Program walk-through:

Used the eval command to create a field called ratio that shows the ratio between the upload and download speeds. Then, created a report using Splunk's table command to display the _time, IP_ADDRESS, DOWNLOAD_MEGABITS, UPLOAD_MEGABITS, ratio fields in a statistics report.
Disk Sanitization Steps Disk Sanitization Steps

Findings
Based on the report generated above, 2/23/2020 @ 2:30 was the approximate time of the DDOS attack on Vandalay. Its reasonable to infer that the attack took place during that time due to the sharp decline in download and upload speeds recorded during that time. I took Vandlay's system approximately 6 hours to recover.

Part 2 Description

Scenerio: Due to the frequency of attacks, your manager needs to be sure that sensitive customer data on their servers is not vulnerable. Since Vandalay uses Nessus vulnerability scanners, you have pulled the last 24 hours of scans to see if there are any critical vulnerabilities.

Assignment: Create a report determining how many critical vulnerabilities exist on the customer data server. Then, build an alert to notify your team if a critical vulnerability reappears on this server.

Program walk-through:

After uploading the Nessues vulnerability scan to Splunk, created a report that shows the count of critical vulnerabilities from the customer database server (10.11.36.23) and counted the number vulnerabilities by their level of severity (informational, low, medium, high, critical).
Disk Sanitization Steps

From the above report, built an alert that monitors every day to see if this server has any critical vulnerabilities. If a critical vulnerability exists, the alert will send an email to [email protected].
Disk Sanitization Steps

Part 3 Description

Scenerio: A Vandaly server is also experiencing brute force attacks into their administrator account. Management would like you to set up monitoring to notify the SOC team if a brute force attack occurs again

Assignment: Analyze administrator logs that document a brute force attack. Then, create a baseline of the ordinary amount of administrator bad logins and determine a threshold to indicate if a brute force attack is occurring.

Program walk-through:

After uploading the admin logs to Splunk, created a timechart that shows the number of failed logon attempts over the entirety of the dataset. Decided to visualize this data as a column chart to better understand the data. This allowed me to easily determine a threshold of greater than 24 failed logon attempts for the Brute Force Attack Alert I created below.
Disk Sanitization Steps

From the above timechart, built an alert that monitors failed logon attempts evey hour. If greater than 24 failed logon attempts are detected, the alert will send an email to [email protected].
Disk Sanitization Steps

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published