Live Cyber Attack Map
The aim of this project is to experience various cloud technologies and combine these technologies with cyber security. The system works as follows. We are creating a vulnerable virtual machine on Azure, this machine will be our honeypot. Thanks to the python script I wrote, we collect the logs of the attacks (only RDP) on […]