Skip to content

Code-tech77/Keystone-Homelab-Red-Blue-Team-Simulation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2 Commits
Β 
Β 

Repository files navigation

Keystone Homelab: Red & Blue Team Simulation

Screenshot 2026-01-25 at 8 55 10β€―pm

πŸ” Project Overview

The Keystone Homelab Enterprise Project is a full spectrum security lab designed to simulate real world enterprise environments.
It bridges Red Team tactics and SOC level defense, allowing hands on exploration of attack simulation, reconnaissance, credential testing, phishing awareness, and defensive monitoring all in a controlled, ethical environment.

This lab was built with the goal of practical security learning and professional portfolio development, without targeting any live systems.


🧰 Tools & Technologies

  • Kali Linux : Penetration testing, OSINT, password testing
  • Evil-WinRM : Post-authentication Windows simulation and privilege escalation
  • LLM-Assisted Phishing Toolkit : Ethical phishing simulation using AI-generated content
  • Wazuh / Security Monitoring Stack : Log collection, SIEM, and endpoint monitoring
  • Hydra / GOAT Password Libraries : Password exposure awareness

🎯 Project Objectives

  1. Understand attacker behavior and reconnaissance techniques
  2. Identify security gaps and practice ethical attack simulation
  3. Simulate credential exposure and social engineering risks
  4. Observe initial access and post-compromise movement in Windows targets
  5. Reinforce defensive controls like endpoint monitoring, privilege management, and detection telemetry

πŸ“š Lab Stages & Documentation

The project is structured into multiple stages, each documented in detail:

Stage Focus Documentation
1 Infrastructure Setup Stage1 : Infrastructure
2 Identity & Access Management Stage2 : Identity.
3 Attack Surface Mapping Stage3 : AttackSurface
4 OSINT & Reconnaissance Stage4 : OSINT
5 Credential Exposure Testing Stage5 : Credentials
6 Phishing Simulation Stage6 : XDR & Wazuh
7 Initial Access Simulation Stage7 : Initial Access
8 Reconnaissance & Post-Compromise Analysis Stage8 : Reconnaissance

πŸ’‘ Key Learnings

  • Reconnaissance is critical : most attacks are won or lost before malware is deployed
  • Credential security remains a top enterprise risk, reinforcing strong password policies and monitoring
  • Ethical phishing demonstrates the importance of user awareness in enterprise defense
  • Post compromise simulations highlight the value of endpoint telemetry, detection, and privilege control

⚑ License & Ethical Notice

All simulations were conducted in a controlled lab environment.
No live or unauthorized systems were targeted.
This project is intended for educational and portfolio purposes only.


πŸ”— Connect with Me

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published