Skip to content

selfridgeoya/Access-control-and-network-analysis

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

image

ACCESS CONTROL & NETWORK TRAFFIC ANALYSIS

Overview

This project demonstrates practical implementation of logical access control hardening and network traffic analysis on a Windows environment. The objective was to evaluate password security, enforce secure authentication policies, and analyze network traffic using industry-standard tools.

The work focuses on preventive and detective security controls, combining password vulnerability assessment, Windows policy enforcement, and packet inspection to identify and filter relevant network activity.

Scope & Objectives

Assess password strength using offline attack techniques

Harden local authentication and account policies on Windows

Analyze network traffic to isolate hosts, protocols, and sensitive patterns

Demonstrate practical use of security tools commonly used in IT and SOC environments

Environment

Operating System: Windows 10 Pro

Network: Local LAN (192.168.0.0/24)

Tools Used:

L0phtCrack

Local Security Policy Editor (secpol.msc)

Group Policy Editor (gpedit.msc)

Wireshark

Part 1 – Password Security Assessment

User Account Configuration

Multiple local user accounts were created to simulate a small corporate workstation environment:

Administrator account

Guest account

Standard user accounts

Passwords of varying complexity were intentionally configured for testing purposes.

Password Attack Simulation

Password strength was evaluated using L0phtCrack through:

Dictionary attacks

Brute-force attacks

Results were reviewed to identify weak credentials and common password vulnerabilities.

This scenario simulates a small corporate environment where a security analyst is responsible for evaluating password strength and authentication controls. Local user accounts representing different access levels were created in order to assess password resilience using offline analysis techniques.

image

As the network admin, you will run L0phtCrack 2 times, first for the dictionary attack and second for the brut force attack to break the passwords. Show the results and analyze it briefly

User Account Setup

Local user accounts were created to simulate different access levels:

  • Administrator
  • Guest
  • Standard users

These accounts were used exclusively for password strength testing and policy enforcement.

image

Password strength was assessed using L0phtCrack by executing dictionary and brute-force attack simulations against test user accounts. Results were analyzed to identify weak credentials and inform access-control hardening decisions.

Dictionary attack results

image

The results show that the passwords for Christ Selfridge and Guest1 were easily cracked within 11s. There is No surprised there, as these passwords lacked complexity and were among the most commonly used passwords at some point.

Brute-force attack outcomes

image

After performing the brute-force attack, none of the remaining passwords were successfully cracked. This outcome was expected due to their increased complexity. The remaining passwords demonstrated characteristics of strong credentials, including sufficient length, a mix of uppercase and lowercase characters, numeric values, special characters, and the use of uncommon words. These factors significantly increased resistance to brute-force attacks.

The recommended access control measures were implemented using Windows Local Security Policy and Group Policy Editor, ensuring consistent enforcement of password and account lockout configurations across the system.

image image image

i.     Enforce password history Change for 4 passwords remembered

image

ii. Maximum password age

  1. Change for 30 days
image

iv. Minimum password length

image

Part 2 – Network Traffic Analysis (Wireshark)

Wireshark was used to capture and analyze packets on the local network in order to identify specific traffic patterns.

Traffic Analysis Performed

Monitoring all traffic on the 192.168.0.0/24 subnet

Isolating traffic for a specific host

Filtering traffic by:

Source IP address

Destination IP address

HTTP traffic (port 80)

Ethernet MAC address patterns

TCP packets containing the keyword "password"

This scenario simulates a small corporate network where a security analyst is tasked with monitoring and analyzing packet-level network activity using Wireshark. The objective is to identify and isolate traffic associated with a specific host within the local subnet, based on its IP and MAC address, in order to assess communication patterns and potential security risks.

Network traffic associated with a specific host was isolated to analyze communication behavior and identify inbound and outbound connections.

image

IP traffic originating from the selected host was filtered to examine outbound communications and protocol usage.

image

IP traffic destined for the selected host was isolated to analyze inbound connections and potential exposure.

image

HTTP traffic on destination port 80 was filtered to identify unencrypted web communications and potential exposure of sensitive data.

image

A Packets associated with a specific Ethernet MAC address were filtered to trace device-level network activity.

image

TCP packets containing the keyword "password" were identified to demonstrate the risks associated with transmitting sensitive information over unencrypted channels.

image

About

Hands-on cybersecurity project using L0phtCrack, Windows Local and Group Policy, and Wireshark to assess access controls and analyze network traffic.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors