Skip to content
#

mitigation-strategies

Here are 7 public repositories matching this topic...

As the Red Team, attack a vulnerable VM within the environment, ultimately gaining root access to the machine. As Blue Team, use Kibana to review logs taken during Day 1 engagement of Red Team’s attack.. Use the logs to extract hard data and visualizations for a detailed report of findings.

  • Updated Nov 13, 2021

Improve this page

Add a description, image, and links to the mitigation-strategies topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the mitigation-strategies topic, visit your repo's landing page and select "manage topics."

Learn more