Cybersecurity Projects Portfolio

This portfolio showcases two interconnected cybersecurity projects that build upon each other. The first project focuses on designing and deploying a virtual SOC lab, while the second extends its capabilities by developing an automated SIEM correlation and attacker timeline reconstruction system. Together, they demonstrate skills in threat detection, log correlation, automation, and security monitoring.


Screenshots

Nmap Vulnerability Scans

Nmap Network Scan Network scan of local subnet using Nmap to identify live hosts and open ports.
Nmap Vuln Scan 1 Initial vulnerability scan against target IP showing open DNS service and multiple CVEs.
Nmap Vuln Scan 2 Extended vulnerability listing with exploit references from Exploit-DB and Vulners.
Nmap Vuln Scan 3 Continued vulnerability enumeration, including CVEs with severity ratings and links.
Nmap Vuln Scan 4 Additional service vulnerabilities and exploit metadata gathered via Nmap scripts.

Social-Engineer Toolkit (SET) Attacks

SET Toolkit Menu Main menu of the Social-Engineer Toolkit showing attack and testing modules.
SET Web Attack Setup Web attack configuration screen for cloning and harvesting credentials from a target site.
SET Toolkit Login Page 1 Phishing page login interface designed for credential capture during testing.
SET Toolkit Login Page 2 Captured login page clone showing credential input fields for analysis.
SET Toolkit Login Page 3 Alternative phishing login interface variant for testing multi-page workflows.

SIEM & Threat Intelligence Platform

OpenCTI Dashboard Main dashboard of OpenCTI platform showing threat intelligence workspace.
OpenCTI Connectors List of OpenCTI connectors used for external intelligence integration.
Docker Compose Pull/Up Terminal output after pulling and starting all OpenCTI services with Docker Compose.
Wazuh FTP Windows Rule Custom Wazuh rule for detecting failed FTP logins on Windows using FileZilla.
Wazuh Rules List Wazuh rules management interface showing applied security rules and compliance checks.

2. Project 2: Automated SIEM Correlation & Attacker Timeline Reconstruction

Status: In Progress
Version Control: GitHub Repository
Tech Stack: Python, Bash, Wazuh, Elasticsearch, Kibana, Sysmon, Auditd

Summary

This project enhances the SOC lab by adding an intelligent SIEM-based system capable of:

Problem Statement

Security analysts spend significant time manually parsing logs to understand attack sequences.
This project automates correlation and timeline generation, making threat analysis faster and more accurate.

Goals

Key Features

How They Connect

Project 1 lays the foundation by building the SOC lab and enabling attack simulations.
Project 2 builds on that lab to introduce advanced log correlation, automated attacker timeline creation, and proactive threat response.


Documentation


All projects are under active version control and documented in accordance with professional cybersecurity project standards.

Forrest Frank · LIFT MY HANDS