Skip to content

okedeleoea/network-detection-lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

7 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

🚨 Network Detection Lab

(SIEM-First SOC Detection, Investigation & Gap Analysis)

πŸ“Œ Overview

This lab demonstrates how a Security Operations Center (SOC) detects, investigates, and documents internal reconnaissance and attempted abuse activity using SIEM-style detection logic and investigation workflows.

The focus is detection, correlation, and incident response documentation β€” not exploitation.

This project builds directly on findings from the network-discovery phase and shows how those activities are translated into actionable detections, incident reports, and improvement plans.

🎯 Objectives

Detect internal network discovery activity

Identify unauthorized privileged account creation

Validate firewall controls blocking SMB lateral movement

Investigate attempted (but failed) credential abuse

Document a SOC-style incident response

Identify detection gaps and detection maturity level

πŸ§ͺ Lab Environment Component Details Analyst / Attacker Kali Linux Target Host Windows workstation Logs Reviewed Network traffic, Windows Security Events SIEM Elastic-style KQL (conceptual, production-aligned) Scope Detection, investigation, documentation

⚠️ No successful exploitation, persistence, or lateral movement occurred.

πŸ” Attack & Detection Summary

Internal network scanning and service discovery

Unauthorized local user account created

Attempted credential abuse via scheduled task

Task creation failed

Attempted SMB-based lateral movement

TCP/445 blocked by firewall

Outcome

No authentication success

No persistence achieved

No lateral spread

πŸ›‘οΈ Detection Capabilities Demonstrated 1️⃣ Network Discovery Detection

Identification of port scanning behavior

Correlation of multiple destination ports

2️⃣ Privileged Account Monitoring

Detection of local user creation

Identification of administrator group modification

3️⃣ Credential Abuse (Attempted)

Review of failed scheduled task creation

Investigation of misuse attempts without execution

4️⃣ Lateral Movement Prevention

Validation of blocked SMB traffic (TCP/445)

Confirmation of firewall effectiveness

πŸ“Š SIEM Detection Logic (Conceptual) Elastic KQL – Blocked SMB Attempt network.transport : "tcp" and destination.port : 445 and event.action : ("DROP", "BLOCK")

Detection logic is conceptual, written to reflect how Elastic Security detections are authored in production SOCs.

🚨 Incident Outcome Attribute Value Impact None Status Contained Severity Low–Medium Root Cause Unauthorized local account creation attempt Lateral Movement Prevented πŸ“‰ Detection Gap Analysis

Identified gaps during investigation:

❌ No alert on failed scheduled task creation

❌ No behavioral detection for service account misuse

❌ Limited visibility into blocked authentication attempts

⚠️ Correlation required manual analysis

These gaps directly inform future detection engineering and automation efforts.

πŸ“ˆ Detection Maturity Assessment Area Maturity Reconnaissance Detection 🟑 Basic Privileged Account Monitoring 🟑 Partial Credential Abuse Detection πŸ”΄ Weak Lateral Movement Prevention 🟒 Strong Automated Correlation πŸ”΄ Not Implemented 🧠 Lessons Learned

Failed attacks provide valuable detection signals

SOC visibility must include attempted abuse, not just success

Preventive controls are strongest when paired with detection

Detection gaps are actionable roadmap items, not failures

🧩 MITRE ATT&CK Mapping (Partial / Prevented)

TA0043 – Reconnaissance

T1046 – Network Service Scanning

TA0006 – Credential Access (Attempted)

Failed scheduled task execution

TA0008 – Lateral Movement (Prevented)

T1021.002 – SMB / Admin Shares

πŸ“‚ Repository Structure network-detection-lab/ β”œβ”€β”€ README.md β”œβ”€β”€ incident-report.md # Formal SOC incident report β”œβ”€β”€ detection-gap-analysis.md # Identified detection weaknesses β”œβ”€β”€ detection-maturity.md # SOC maturity assessment β”œβ”€β”€ detections/ # KQL / detection logic examples └── remediation.md # Detection & hardening recommendations

🧠 Background Context

This lab builds on hands-on training from:

Google Cybersecurity Professional Certificate

Google Cloud Cybersecurity Certificate

IBM Cybersecurity Case Studies

Google Security Operations (Chronicle)

Focus: Translating theory into observable detections, investigations, and SOC-ready documentation.

About

SIEM-first network detection and SOC alert engineering

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published