This project will demonstrate cyber attack and defence techniques over virtual machines. The project will simulate an intricate attack that will allow the hacker ot obtain sensitive information from the target company for benefit.
• Overview • Technical details • Team • Disclaimer • License •
- Installation and execution of Oracle VM Virtual Box (virtual machines of Kali Linux, Ubuntu, Windows 11, Windows 10, or Windows 7).
- Use of networking tools, "SNORT" for network intrusion detection.
- Use of shell scripts to perform reverse-shell attack and file manipulation.
- Use of PHP scripts to capture victim's IP address.
- Use of LOIC (Low Orbit Ion Cannon) to perform DDoS attack.
- Use of File.io to upload and download files with the help of curl scipts.
Please refer to our Attack Flow and Defence
Song Guo Quan (Group leader)
Jiang Qinbo
Muhd Fahmi bin Ahmad
Long Shi Jun
Glendon Chan Jun Wei
Choi Hoi To Tommy
Jonathan Wongso
Chan Ler, Wayne
The codes in this repository are for educational purposes only, intended to learn more on cyberattacks.
You may not use this software for illegal or unethical purposes. This includes activities which give rise to criminal or civil liability.
Under no event shall the licensor be responsible for any activities, or misdeeds, by the licensee.
The MIT License (MIT)