Skip to content

A beginner-friendly, Docker-powered lab for hands-on intrusion detection and incident response. Features a live attacker, traffic analysis with Snort, and a capture-the-flag challenge — all with one-click setup.

Notifications You must be signed in to change notification settings

trigerman/IncidentResponseLab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Network Lab - Intrusion Detection Simulation

Setup Instructions

1. Install Dependencies

Docker (Required)

Python Packages

Install required Python packages using pip:

pip install -r requirements.txt

Note: You must have Python 3 and pip installed.

2. Run the Lab

python3 run.py         # Normal mode
python3 run.py --debug # Debug mode

In debug mode, logs and attacker details are visible. In normal mode, you are dropped into the Snort container shell directly.


Objective

  • The Snort container will open with a SECURITY BREACH banner.
  • Your mission:
    • Analyze network traffic (Snort, tcpdump)
    • Identify the attacker’s:
      • Payload
      • Last octet of IP address
      • Target port number
  • Submit the flag using the found command:
found <payload>_<lastoctet>_<port>

Example:

found shadow_2_8080

Important Notes

  • The attacker runs silently in the background.
  • No clues are shown in normal mode.
  • The attacker adapts if the wrong flag is submitted!
  • The flag is generated fresh each session.

🎯 Good Luck, Defender!

About

A beginner-friendly, Docker-powered lab for hands-on intrusion detection and incident response. Features a live attacker, traffic analysis with Snort, and a capture-the-flag challenge — all with one-click setup.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published