Skip to content

Conducted a cyber attack on a vulnerable Windows machine, performed post-exploitation, and analyzed forensic artifacts using Kali Linux, Metasploit, Nmap, Wireshark, Autopsy, Security Onion, and Volatility. Investigated network traffic, memory, and disk images to reconstruct the attack timeline.

Notifications You must be signed in to change notification settings

ajansha/Digital-forensics-and-incident-response

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

This project explores both offensive and defensive aspects of cybersecurity by simulating a real-world cyber attack and conducting a digital forensic investigation. A vulnerable Windows machine was targeted, exploited, and later analyzed to reconstruct the attack timeline and identify key evidence.

Using Kali Linux, Metasploit, and Nmap, vulnerabilities were discovered and exploited, leading to unauthorized system access. Post-exploitation activities included privilege escalation, credential dumping, and malware execution, demonstrating the tactics used by attackers to maintain persistence.

Following the attack, forensic techniques were applied to uncover traces left behind. Network traffic analysis with Security Onion revealed scanning activities, suspicious SMB traffic, and remote command execution. Memory forensics with Volatility helped identify injected malicious processes, unauthorized user accounts, and PowerShell-based attacks. Disk analysis with Autopsy recovered deleted files, logs, and malware artifacts, piecing together the attacker’s actions.

This project provided hands-on experience in penetration testing, incident response, and forensic analysis, highlighting how attacks unfold and how investigators can trace and mitigate them.

About

Conducted a cyber attack on a vulnerable Windows machine, performed post-exploitation, and analyzed forensic artifacts using Kali Linux, Metasploit, Nmap, Wireshark, Autopsy, Security Onion, and Volatility. Investigated network traffic, memory, and disk images to reconstruct the attack timeline.

Topics

Resources

Stars

Watchers

Forks