Difficulty
intermediate
Average duration
3 hrs
Technologies
Networking
cybersecurity
penetration testing
forensic analysis
incident response
Difficulty
intermediate
Average duration
3 hrs
Technologies
Networking
cybersecurity
penetration testing
forensic analysis
incident response
For this final project, you will assume the role of a cybersecurity analyst responsible for restoring and protecting a critical server that has been compromised at 4Geeks Academy. You will be provided with a hacked machine that simulates a key company server, and your task will be to re-establish its security, fix the exploited vulnerabilities, and ensure its optimal functionality. The exercise is divided into three phases that will test your skills in forensic analysis, vulnerability detection and remediation, and incident response.
Phase 1 - Hack Correction
In the first phase, you will conduct a forensic analysis of the incident, identify the vulnerabilities exploited by the attacker, and block the exploit to prevent further escalation of the attack.
Phase 2 - Detection and Correction of a New Vulnerability
In the second phase, you will scan the system for an additional vulnerability, different from the one previously exploited. Once detected, you will exploit the vulnerability in a controlled manner to understand its impact, escalate its privileges, fix it, and create a report that explains the entire process.
Phase 3 - Incident Response Plan and Certification
The final phase involves designing an incident response plan based on industry best practices, such as the NIST recommendations. As part of this exercise, you will develop an Information Security Management System (ISMS) in accordance with the ISO 27001 standard, which will include measures to prevent data leaks through Data Loss Prevention (DLP) policies.
Objective: Conduct a forensic analysis to block the exploit, fix the vulnerability, and prevent the attacker from escalating.
grep
to review system logs (for example, /var/log/auth.log
for SSH connections).systemctl stop service
) if necessary.Objective: Scan, detect, and exploit a vulnerability different from the one previously exploited and create a report that explains the entire process.
Nmap
.Objective: Design an incident response plan based on best practices and develop an Information Security Management System (ISMS) in accordance with the ISO 27001 standard.
Below are the key reviews that the instructor should consider in the student's deliverable:
Verification of MySQL Configuration:
FTP Server Configuration:
Insecure SSH Access:
Unnecessary Open Ports:
Permissions on wp-config.php:
Listable Web Directory:
Pentesting Report: Confirm that it includes details of each vulnerability, tests performed, and solutions applied.
Security Incident Report: Validate if a forensic analysis of the findings is described and review that corrective and preventive measures implemented are explained.
Incident Recovery Plan: Check if the plan covers critical services and details recovery procedures.
Executive Presentation for Management: Evaluate if it is structured clearly and professionally. Verify if it includes a summary of detected issues, implemented solutions, and future recommendations.
The instructor must ensure that the deliverable not only documents the findings but also proposes applicable solutions and shows evidence of their implementation. The presentation should be aligned with a professional and management-oriented approach.
Difficulty
intermediate
Average duration
3 hrs
Technologies
Networking
cybersecurity
penetration testing
forensic analysis
incident response
Difficulty
intermediate
Average duration
3 hrs
Technologies
Networking
cybersecurity
penetration testing
forensic analysis
incident response
Difficulty
intermediate
Average duration
3 hrs
Technologies
Networking
cybersecurity
penetration testing
forensic analysis
incident response
Difficulty
intermediate
Average duration
3 hrs
Technologies
Networking
cybersecurity
penetration testing
forensic analysis
incident response
Difficulty
intermediate
Average duration
3 hrs
Technologies
Networking
cybersecurity
penetration testing
forensic analysis
incident response
Difficulty
intermediate
Average duration
3 hrs
Technologies
Networking
cybersecurity
penetration testing
forensic analysis
incident response