🛡
SecOps Lab
📊 Flow & UBA
📡 Wireshark
🛡 EDR
🌐 DHCP
🔥 DNS Firewall
LIVE
ANOMALY ALERTS
0
Monitoring network flows…
Flows/sec
0
avg last 60s
Packets/sec
0
current rate
Anomalies
0
last 5 min
Alerts
0
unacknowledged
Network Flow Records (NetFlow / IPFIX)
▶ Simulate Flows
⚡ Simulate DDoS
Clear
Time
Src IP
Dst IP
Proto
Src Port
Dst Port
Packets
Bytes
Dur
Flow Type
Status
User Behavior Analysis
Simulate Breach
Threat Detection Matrix
INCIDENT CORRELATION ENGINE
Simulate flows and breach to see correlation…
Capture Settings
Interface
Wi-Fi (802.11ac)
Ethernet 0
Loopback (lo)
Capture Filter
▶ Start
■ Stop
TCP 3-Way Handshake
Client ↔ Server
Client
SYN (seq=0)
Server
Client
SYN-ACK
Server
Client
ACK (ack=1)
Server
✓ Connection Established
Generate Traffic
HTTP/HTTPS Traffic
DNS Queries
UDP Stream
Filter:
Clear
0 packets
#
Time
Source
Destination
Protocol
Length
Info
Select a packet to inspect…
Select a packet to view hex dump…
Dashboard
📊
Overview
🖥
Endpoints
2
Management
🔧
Patch Manager
🔍
Malware Scan
🔐
MFA Setup
DHCP Server Manager
🌐 DHCP Server
📋 IPv4
📁 LAN Scope
🖥 Address Leases
🚫 Exclusions
📌 Reservations
⚙ Scope Options
⚡ Install DHCP Role
SERVER STATUS
Running
Lab Wizard
New Outbound Rule
Rule Type
Port
Program
Protocol
TCP
UDP
Both TCP and UDP
Specific Port
Action
Block the connection
Allow the connection
Rule Name
Create Rule
Test DNS Query
Clear All Rules
Windows Firewall — Outbound DNS Traffic Flow
🖥
Endpoint
🔥
Firewall
🌐
DNS :53
☁️
Internet
DNS traffic flows freely — no outbound rule active
Outbound Rules (Windows Defender Firewall)
0 rules
No outbound rules. Use the wizard on the left.
DNS Query Test Log
Clear
A
AAAA
MX
NS
Query
[boot]
DNS filtering lab ready. Create a block rule for port 53 then test queries.
✓