
Chapter 11 - SSH Brute-Force Response Using Wazuh Active Response
Responding to a simulated SSH brute-force attack using Wazuh Active Response.

Responding to a simulated SSH brute-force attack using Wazuh Active Response.

Simulating and detecting an SSH password brute-force attack in Wazuh.

Deploying Wazuh agent on endpoint to enable real-time monitoring and alerting.

Enabling and verifying Wazuh Dashboard access from the WAN.

Deploying Wazuh to monitor and collect internal security events.

Enabling Opnsense Dashboard access from the WAN.

Configuring OPNsense and setting up VLANs to segment traffic.

Setting up a Debian VM as the internal admin endpoint.

Deploying OPNsense as a virtual firewall to secure lab network traffic.

Creating LAN and WAN bridges in Proxmox to connect virtual machines.