Our passion for cyber security
What it does
It automates the kill chain from surveillance to reconnaissance to exploitation and payload delivery while sustaining the integregrity and security of itself.
How I built it
We configured and Ubuntu image to run on a raspberry pi with suricata intrusion detection and prevention system set up to monitor and defend it's own hosted network. Meanwhile we made use of many different hacking tools in the kill chain and automated the use of these tools with python.
Challenges I ran into
Configuring the system to run correctly with an acceptable os and IDS/IPS has been the hardest issue.
What I learned
We learned a lot about managing and coordinating many tools to work together