Skip to content

ChoiTommy/EE3080-Cyber-Attack-and-Defence

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

34 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

EE3080 DIP Cyber Attack and Defence Group E037

This project will demonstrate cyber attack and defence techniques over virtual machines. The project will simulate an intricate attack that will allow the hacker ot obtain sensitive information from the target company for benefit.

OverviewTechnical detailsTeamDisclaimerLicense

Overview

  • Installation and execution of Oracle VM Virtual Box (virtual machines of Kali Linux, Ubuntu, Windows 11, Windows 10, or Windows 7).
  • Use of networking tools, "SNORT" for network intrusion detection.
  • Use of shell scripts to perform reverse-shell attack and file manipulation.
  • Use of PHP scripts to capture victim's IP address.
  • Use of LOIC (Low Orbit Ion Cannon) to perform DDoS attack.
  • Use of File.io to upload and download files with the help of curl scipts.

Technical details

Please refer to our Attack Flow and Defence

Report

Project Report

Team

Song Guo Quan (Group leader)
Jiang Qinbo
Muhd Fahmi bin Ahmad
Long Shi Jun
Glendon Chan Jun Wei
Choi Hoi To Tommy
Jonathan Wongso
Chan Ler, Wayne

Disclaimer

The codes in this repository are for educational purposes only, intended to learn more on cyberattacks.

You may not use this software for illegal or unethical purposes. This includes activities which give rise to criminal or civil liability.

Under no event shall the licensor be responsible for any activities, or misdeeds, by the licensee.

License

The MIT License (MIT)