Reference no: EM133779628
Ethical Hacking and Penetration Testing
Assessment details
Assessment: Command and Control Project Report and Presentation
Introduction
In this group assessment, students will form teams of 2-3 students.
In a live simulated war-room event (3hrs), students will create a command and control centre and attempt to take control of several machines. However, on the same network other students are also using command and control centre to take over the same victim network. The victim network is made of routers, switches, servers and end-user devices controlled by an active AI. Once you take control of a victim machine you are to secure it and block others from taking over it. Your team can take over a victim machine that has already been conquered by another group's command and control.
You are required to document your command and control centre methods throughout the entire MITRE Kill-chain. Also include an analysis of the automation behind the scene and the environment. You will need to setup the Caldera MITRE with command and control centres. You will need to access them over a LAN network where several other teams can access (e.g. the lab via Wifi). There will be several virtual machines on the network.
Prior to this event you will develop blue and red teams playbooks in Caldera MITRE. Then deploy playbooks in the live event. This includes creating blue teams scripts. At the live event you are given a blank Operating System to harden (will be a server or something with a server application). There may be some unattended virtual machines on the network.
The method of the report must show your penetration command and control strategy with logical justification. Your defences commands and methodology. An analysis of the environment and AI tools defending themselves, in additional to other attack predators out there. After conquering a victim, explain how you locked the victim out and other attackers such that machine can not be overtaken by others.