
Chapter 14 - Analysis of SYN Scan Behaviour and IDS Detection
Custom Suricata rule creation and SYN scan detection validation

Custom Suricata rule creation and SYN scan detection validation

Deploying OWASP Juice Shop and DVWA as intentionally vulnerable targets in LXC containers on Proxmox.

Detecting suspicious command execution using Suricata IDS integrated with OPNsense.

Responding to a simulated SSH brute-force attack using Wazuh Active Response.

Simulating and detecting an SSH password brute-force attack in Wazuh.

Deploying Wazuh agent on endpoint to enable real-time monitoring and alerting.

Enabling and verifying Wazuh Dashboard access from the WAN.

Deploying Wazuh to monitor and collect internal security events.

Enabling Opnsense Dashboard access from the WAN.

Configuring OPNsense and setting up VLANs to segment traffic.