Built using Microsoft Azure, this project consists of 4 VMs, including an vulnerable machine, a Kali Linux machine, an ELK Stack machine, and a HyperV machine, to carry out a reverse shell exploit, followed by a comprehensive report including a hardening recommendation for the vulnerable machine.
This project focused on using the following skills to first exploit a system and then write a report for the exploited system:
-
Penetration testing with Kali Linux.
-
Log and incident analysis with Kibana.
-
System hardening and configuration.
-
Reporting, documentation, and communication.
🔗 The full report of the reverse shell exploitation as well the incident analysis and hardening recommendations that followed the exploitation can be viewed by clicking this link or the slide deck image below: