Skip to content

Krishcyber2005/Active-Directory-Wazuh-SIEM-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

7 Commits
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

Active Directory & Wazuh SIEM Cybersecurity Lab

This repository contains my hands-on Active Directory & SIEM capstone project, where I built a small enterprise environment, executed real attacks (brute force, Kerberoasting, persistence, etc.), and detected them using Wazuh SIEM + Sysmon.

๐Ÿ“„ Full report (PDF):
Active Directory & Wazuh SIEM Capstone Report


๐Ÿ— Lab Architecture

The lab simulates a small Windows domain environment with a SIEM:

  • DC01 โ€“ Domain Controller

    • Windows Server 2019
    • Active Directory Domain Services (AD DS)
    • DNS
    • Group Policy (GPO)
    • Sysmon logging
  • WIN10 โ€“ Domain-Joined Client

    • Windows 10 Pro
    • Joined to AD domain
    • Sysmon installed
    • Used for user activity & attacks
  • Wazuh Server

    • Wazuh Manager, Indexer, and Dashboard
    • Receives logs from DC01 and WIN10
    • Provides alerts + MITRE ATT&CK mapping

๐Ÿ“Š See the full architecture and screenshots in the PDF report.


๐Ÿ” Hardening & Configuration

Key security controls implemented:

  • Password complexity and minimum length
  • Account lockout policy
  • Disabled LLMNR
  • Disabled SMBv1
  • Blocked PowerShell v2
  • Enforced custom desktop policy via GPO
  • Installed Sysmon on DC01 and WIN10
  • Forwarded Windows + Sysmon logs to Wazuh

๐Ÿ’ฃ Attacks Simulated

All attacks were run from the domain-joined WIN10 machine (and/or attacker VM) against the AD environment to generate realistic log data.

  • Brute Force Attack

    • Repeated failed logons (Event ID 4625)
    • Detected by Wazuh as authentication failures
  • Kerberoasting

    • Service ticket requests (Event ID 4769)
    • Detected by Wazuh rules mapped to MITRE T1558.003
  • Privilege Escalation / DCSync-like Activity

    • Elevated logons and directory replication-style access
    • Event IDs 4672, 4662
    • Visible in Sysmon + Wazuh
  • Persistence via Scheduled Task

    • Creation of a malicious scheduled task
    • Event ID 4698
    • Detected as suspicious persistence behavior

๐Ÿ›ฐ Detection & SIEM (Wazuh)

Wazuh was used as the central SIEM to:

  • Ingest Windows Event Logs + Sysmon events
  • Correlate events across DC01 and WIN10
  • Trigger alerts on:
    • Excessive failed logons
    • Suspicious Kerberos activity
    • Privileged logons
    • Scheduled task creation
  • Map alerts to MITRE ATT&CK techniques

Example detection coverage (from the report):

Attack Type Event IDs Detection Source MITRE Technique
Brute Force 4625 Wazuh T1110
Kerberoasting 4769 Wazuh T1558.003
Privilege Escalation 4672, 4662 Sysmon + Wazuh T1003
Persistence (Task) 4698 Wazuh T1053

๐Ÿง  Skills Demonstrated

This lab demonstrates:

  • Active Directory deployment & hardening
  • Group Policy design and enforcement
  • Sysmon installation and event analysis
  • Wazuh SIEM deployment and configuration
  • Log correlation and detection engineering
  • Mapping detections to MITRE ATT&CK
  • Writing an investigation-style security report (PDF)

๐Ÿ“Ž Files in this Repository

  • Active-Directory-Wazuh-SIEM-Capstone.pdf โ€“ Full project report with screenshots
  • images/ โ€“ Selected screenshots from the lab environment

๐Ÿ”ฎ Next Steps / Future Improvements

Some ideas to extend this lab:

  • Add Linux servers or additional Windows clients
  • Ingest logs into another SIEM (e.g., Elastic, Splunk) for comparison
  • Add more attack techniques (lateral movement, pass-the-hash, etc.)
  • Build Sigma rules or custom Wazuh rules for niche detections

If you have questions or want to discuss the lab, feel free to reach out!

Releases

No releases published

Packages

 
 
 

Contributors