🛡️ Challenge 07 • Network Attack & Firewall Detection

Offline Level 7 Port Scanning & Network Attacks
💡 Next Hint: 30s

Mission Brief

Your Network Intrusion Detection System (NIDS) flagged suspicious port scanning activity targeting web server (web-prod-03) at 18:45 UTC on November 28, 2025. Firewall logs show thousands of connection attempts from an external IP scanning multiple ports. Shortly after, fail2ban triggered multiple bans. Your mission is to analyze firewall logs, fail2ban actions, and network patterns to identify the attack type and scope.

⚠️ SYNTHETIC SCENARIO
All log data, IP addresses, port scans, and attack patterns in this challenge are synthetically generated for training purposes. No real attack infrastructure or C2 servers are represented.

Available Artifacts

  • /var/log/ufw.log – Ubuntu firewall (UFW) connection attempts and blocks
  • /var/log/fail2ban.log – Automated banning of malicious IPs
  • /var/log/syslog – System events and network anomalies
  • Connection statistics – Port/protocol analysis

Learning Objectives

  • Detect port scanning patterns (nmap signatures)
  • Analyze firewall logs for attack reconnaissance
  • Understand fail2ban automated responses
  • Identify brute-force and DDoS patterns
  • Recognize network-level attack TTPs
  • Map attacks to MITRE ATT&CK framework