Skip to content

SancLogic/Soc-Honeynet-Azure

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

42 Commits
 
 
 
 

Repository files navigation

Building a SOC + Honeynet in Azure (Live Traffic) with Compliance

Cloud_Soc.png

Introduction

This project focuses on building a Security Operations Center (SOC) and Honeynet in Microsoft Azure, monitoring live attacks, and enforcing compliance. The goal is to detect, investigate, and mitigate real-world cyber threats using Microsoft Sentinel and Defender for Cloud.

Key objectives:

  • Deploying Microsoft Sentinel as a SIEM for log collection and threat detection.
  • Implementing Defender for Cloud for compliance enforcement (NIST SP 800-53).
  • Utilizing Microsoft Defender Threat Intelligence (MDTI) to enrich threat investigations.
  • Monitoring Windows security logs, Sysmon, and Entra ID logs for threat detection.
  • Simulating a Windows brute-force attack followed by post-exploitation activities.
  • Investigating the attack telemetry and correlating evidence using Sentinel logs.
  • Comparing pre- and post-hardening security effectiveness.

Tools Used

  • Microsoft Sentinel – SIEM for log analysis & correlation.
  • Microsoft Defender for Cloud – Compliance & security monitoring.
  • Microsoft Defender Threat Intelligence (MDTI) – Threat enrichment & investigation.
  • Log Analytics Workspace – Centralized security event storage.
  • Windows Security Logs & Sysmon – Process execution & forensic analysis.
  • Azure Entra ID Logs – Authentication monitoring & anomaly detection.
  • Kali Linux (Metasploit, Reverse Shell, Mimikatz) – Attack simulation.

Environment Setup & Log Collection

  • Deployed Windows victim VMs in Azure for monitoring.
  • Configured NSG rules to log and monitor external connections.
  • Installed Sysmon on Windows VMs for process execution & network activity logging.
  • Enabled log forwarding for:
    • Windows Security Logs (Failed logins, logon attempts, privilege escalation).
    • Entra ID Logs (Authentication tracking, MFA violations).
    • Microsoft Defender Threat Intelligence (MDTI) IP & Domain Reputation Lookups.
    • Defender for Cloud Security Alerts (Policy compliance monitoring).
  • Integrated all logs into Microsoft Sentinel for correlation.

Log Ingestion.png

image.png

image.png


Brute Force Attack & Post-Exploitation

  • Kali Linux executed an RDP brute-force attack against a Windows VM.
  • Sentinel generated an alert for multiple failed login attempts (Event ID 4625).
  • Successful login achieved using brute force, triggering an alert in Defender for Cloud.
  • Post-exploitation included reverse shell access, user creation for persistence, scheduled task execution, and credential dumping using Mimikatz.

Sentinel Analytics-.png

Sentinel Incident Logs-.png

Workbooks Sentinel.png

Mitre Attack Mapping Brute Force.png

Sentinel automation Rules.png


Compliance Monitoring & Security Hardening

  • Enabled Defender for Cloud for continuous compliance tracking.
  • Integrated Microsoft Defender Threat Intelligence (MDTI) to correlate threat indicators.
  • Implemented SC-7 (Network Security Controls) for boundary protection.
  • Compliance Monitoring Implemented:
    • MFA Enforcement (Tracked failed authentication attempts in Entra ID).
    • Access Control Violations (Blocked unauthorized login attempts).
    • Encryption Compliance (Enabled full encryption for sensitive resources).
    • NSG Flow Analysis (Prevented unauthorized remote connections).

image.png

image.png

image.png


Pre-Hardening vs Post-Hardening Security Comparison

Open_System.png

Before Hardening (Open System)

  • Security Events: 38,810
  • Syslog Events: 15,141
  • Security Alerts: 6
  • Security Incidents: 416
  • Malicious Flows Allowed: 2,263

2025-02-21 04_20_31-mssql-auth-fail - Microsoft Azure.png

2025-02-21 04_17_05-windows-rdp-auth-fail - Microsoft Azure.png

2025-02-21 04_18_01-linux-ssh-auth-fail - Microsoft Azure.png

2025-02-21 04_18_43-linux-ssh-auth-fail - Microsoft Azure.png

2025-02-21 04_19_13-windows-rdp-auth-fail - Microsoft Azure.png

2025-02-21 04_19_45-nsg-malicious-allowed-in - Microsoft Azure.png

After Hardening (Secured System)

  • Security Events: 1,452
  • Syslog Events: 14
  • Security Alerts: 0
  • Security Incidents: 0
  • Malicious Flows Allowed: 0

All map queries returned no results due to no instances of malicious activity for the 24-hour period after hardening.

closed system.drawio.png

image.png


Conclusion

  • Successfully built an Azure-based SOC & Honeynet for real-world attack detection.
  • Integrated log sources into a Log Analytics workspace and configured Microsoft Sentinel for threat detection and incident management.
  • Simulated a Windows brute-force attack and investigated the incident using Sentinel logs.
  • Captured credential theft (Mimikatz) and persistence attempts, analyzing post-exploitation activity.
  • Utilized Microsoft Defender Threat Intelligence (MDTI) to enrich threat investigations.
  • Implemented compliance monitoring with Microsoft Defender for Cloud, focusing on MFA enforcement, access control violations, and encryption compliance.
  • Measured security metrics before and after hardening, confirming a significant reduction in security incidents.
  • Post-hardening security controls entirely eliminated detected security incidents.
  • Continuous monitoring is essential, as legitimate user activity could generate additional security events, requiring ongoing refinement of detection rules and response strategies.

Additional Resources

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors