Kali Linux Attacks & Windows IDS in a Virtual Lab
Автор: Jay
Загружено: 2026-03-02
Просмотров: 13
Описание:
This video shows a security demo I built for a class project. All attacks were performed inside an isolated virtual environment.
The purpose of this project was to simulate real cyberattacks, show how they work, and demonstrate how basic intrusion detection can still catch malicious activity using built-in Windows tools.
🎯 Objectives
Launch and analyze three attacks:
Network Enumeration, Man-in-the-Middle (MITM), and Denial-of-Service (DoS)
Detect and log attacks using Windows Firewall and system monitoring tools
📌 Intrusion Detection System
The IDS setup for this project used:
Windows Firewall (pfirewall.log) to record dropped packets, allowed connections, and suspicious traffic
Resource Monitor to capture baseline CPU, memory, and network performance before attacks
Command Prompt (arp -a) to record baseline MAC/physical addresses
These tools, combined, provided a lightweight intrusion detection method that clearly showed changes during each attack.
🖥️ Internal network architecture
Win7 Client (Promiscuous mode deny)
Simulates a normal user accessing services
Win7 Server (Promiscuous mode allow)
Target machine hosting services (IDS is done on here)
Kali Linux Attacker (Promiscuous mode deny)
Runs enumeration, MITM, and DoS attacks
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: