Lab 12 – Network Attack Simulation & Detection Validation
Simulate controlled network attacks to validate IDS/IPS and SIEM correlation accuracy, ensuring your monitoring stack detects and escalates threats effectively.
Objective Lab goal
This lab validates your IDS/IPS and SIEM by simulating port scans, exploit attempts, and suspicious DNS queries. You’ll confirm alerts fire correctly, correlate across systems, and document detection accuracy.
- Outcome 1: Controlled attacks executed safely inside the homelab.
- Outcome 2: IDS/IPS alerts triggered and validated.
- Outcome 3: SIEM correlation confirmed across host and network layers.
- Outcome 4: Detection gaps identified and documented.
Lab 12: Simulating port scans and exploit attempts to validate IDS/IPS and SIEM correlation.
Deliverables End‑of‑lab checklist
- DL12.1: Port‑scan alerts validated.
- DL12.2: Exploit‑attempt alerts validated.
- DL12.3: SIEM correlation confirmed.
- DL12.4: Detection gaps documented.
- DL12.5: Final Month 3 report completed.
Lab Steps Step‑by‑step instructions
Step 1 – Simulate Port Scans
~45 minutes- From WIN10‑LAB, run:
nmap -sS 10.10.10.1
- Run a more aggressive scan:
nmap -A 10.10.10.1
- Verify IDS/IPS alerts for:
- SYN scans
- OS fingerprinting
- Service enumeration
- Confirm SIEM correlation with host logs.
Step 2 – Simulate Exploit Attempts
~60 minutes- Use Metasploit (or a safe test script) to simulate:
- SMB probe
- HTTP directory traversal
- Weak‑credential login attempts
- Verify IDS/IPS signatures fire correctly.
- Check SIEM for correlated host‑based alerts.
Step 3 – Simulate Suspicious DNS Queries
~30 minutes- Query known test domains (non‑malicious but flagged for training).
- Verify DNS‑related IDS/IPS alerts.
- Confirm SIEM enrichment with threat‑intel feeds.
Step 4 – Validate Correlation & Document Gaps
~45 minutes- Review SIEM correlation rules for:
- Network + host events
- Threat‑intel matches
- Repeated attacker behavior
- Document any missed detections.
- Update IDS/IPS rules or SIEM logic as needed.
Reflection What you should understand now
- Validation: How simulated attacks confirm your detection stack works.
- Correlation: How IDS/IPS and SIEM combine to reveal attacker behavior.
- Improvement: How detection gaps guide tuning and rule updates.
With this lab, you’ve completed Month 3 and validated your network‑defense capabilities. In Month 4, you’ll move into threat hunting and automation to further mature your homelab.