Projects

SSH and HTTP Traffic Analysis with Snort
Objective:

Detect suspicious SSH and HTTP activities using Snort IDS and analyze network traffic anomalies.

Process and Tools Used:
  1. Snort Configuration: I configured Snort IDS with custom rules to monitor SSH and HTTP traffic.

  2. Traffic Logging: Captured live network traffic to detect anomalies such as brute-force attempts and unauthorized HTTP GET requests.

  3. Alert Visualization: Used Snorby to analyze and visualize traffic patterns flagged by Snort.

Findings:
  • Non-standard SSH Traffic: Continuous traffic between IP 172.29.0.1 and 172.29.0.3.

  • Brute-Force Attempts: Multiple SSH access attempts from 10.3.40.7 to port 22.

  • Suspicious HTTP Requests: Unusual HTTP GET requests from 10.3.40.16 to port 80.

Recommendations:
  1. Access Controls for SSH: Restrict SSH access to trusted IPs and use fail2ban to block repeated failed logins.

  2. Firewall Rules: Limit external traffic to internal networks to prevent unauthorized access.

  3. Web Application Firewall (WAF): Use WAF to monitor and filter suspicious HTTP requests.

This project focused on configuring Snort IDS to identify real-world network anomalies, such as brute-force attacks and suspicious HTTP traffic. By utilizing Snorby for alert visualization, I demonstrated how actionable insights can enhance organizational network security.

Malicious File Detection and Analysis
Objective:

Analyze a suspicious file to detect malware and propose effective remediation strategies.

Process and Tools Used:
  1. Network Monitoring: I began with netstat to identify unusual network connections.

  2. File Analysis: Uploaded suspicious files to VirusTotal to perform an initial malware scan.

  3. Deep Scanning: Verified findings using ClamAV UI, which confirmed the presence of malicious content.

  4. Hash Identification: Generated an MD5 hash of the malicious file for identification and reporting.

Findings:
  • Malicious File: file176.exe

  • Suspicious IP: 123.35.104.34

  • MD5 Hash: f48a8687e91fd9ef98cd1b7aaeeb2a4c

Recommendations:
  1. Enable Antivirus Protection: Regularly update antivirus software to detect known threats.

  2. Hash-Based Detection: Add the malicious file’s hash to antivirus databases for proactive detection.

  3. Network Monitoring: Implement tools to monitor unusual external IP connections.

This project emphasized my ability to quickly identify malware using industry-standard tools like VirusTotal and ClamAV, ensuring accurate detection and reporting. It showcased how network anomalies can indicate deeper file-based threats, allowing for targeted mitigations.

Network Traffic Analysis Detecting SSH & HTTP Anomalies
Objective:

Detect suspicious SSH and HTTP activities using Snort IDS and analyze network traffic anomalies.

Process and Tools Used:

  1. Snort Configuration: I configured Snort IDS with custom rules to monitor SSH and HTTP traffic.

  2. Traffic Logging: Captured live network traffic to detect anomalies such as brute-force attempts and unauthorized HTTP GET requests.

  3. Alert Visualization: Used Snorby to analyze and visualize traffic patterns flagged by Snort.

Findings:
  • Non-standard SSH Traffic: Continuous traffic between IP 172.29.0.1 and 172.29.0.3.

  • Brute-Force Attempts: Multiple SSH access attempts from 10.3.40.7 to port 22.

  • Suspicious HTTP Requests: Unusual HTTP GET requests from 10.3.40.16 to port 80.

Recommendations:
  1. Access Controls for SSH: Restrict SSH access to trusted IPs and use fail2ban to block repeated failed logins.

  2. Firewall Rules: Limit external traffic to internal networks to prevent unauthorized access.

  3. Web Application Firewall (WAF): Use WAF to monitor and filter suspicious HTTP requests.

This project focused on configuring Snort IDS to identify real-world network anomalies, such as brute-force attacks and suspicious HTTP traffic. By utilizing Snorby for alert visualization, I demonstrated how actionable insights can enhance organizational network security.