Cybersecurity Capstone: Red Team Analysis of Man in the Middle Attack's Evasion Against SOC Tools

This is just a showcase of the network design and tools used for my cybersecurity capstone, if you're interested in reading my paper and seeing the attacks, feel free to click on the link below :)

Last updated