Project // 004 ยท Blue Team ยท SOC Operations

SSH Brute Force
Detection Lab

Full attack-to-detection pipeline: simulated a real SSH brute force attack using Hydra on Kali Linux, captured host-level evidence via auth.log, and monitored the entire event through a custom Wazuh SIEM dashboard โ€” tracing individual alerts back to the exact detection rules that fired them.

CategoryBlue Team / SOC
ToolsWazuh ยท Kali ยท Hydra ยท SSH
MITRET1110 โ€” Brute Force
Evidence7 Screenshots
StatusCompleted ยท 2026
01 ยท ATTACK
โ†’
02 ยท HOST LOG
โ†’
03 ยท SIEM
โ†’
04 ยท ALERT
โ†’
05โ€“07 ยท RULES
01
Attack Simulation
Hydra SSH Brute Force โ€” Kali Linux
hydra ยท rockyou.txt wordlist ยท target port 22
Hydra brute force on Kali
A brute-force attack was simulated using Hydra against the SSH service on the target system. The tool generates repeated login attempts using a password wordlist, creating high-frequency authentication failures typical of brute-force credential attacks.
02
Host-Level Evidence
auth.log โ€” Failed Password Entries
grep "Failed password" /var/log/auth.log
auth.log grep output
The system authentication log (/var/log/auth.log) shows multiple failed SSH login attempts from a single source IP within a short timeframe, indicating automated activity. This confirms that the attack reached the host and provides raw evidence of brute-force activity.
03
SIEM Detection
Wazuh SSH Attack Monitor Dashboard
Custom dashboard ยท 4 visualizations ยท wazuh-alerts-4.x-* index
Wazuh SSH Dashboard
A custom Wazuh dashboard visualizes the attack activity, including alert volume over time and the originating IP address responsible for the activity. The spike in alerts during the attack window confirms that the SIEM successfully ingested and identified the abnormal authentication behavior.
04
Alert Investigation
Expanded Alert โ€” Full Event Detail
rule.id ยท data.srcip ยท timestamp ยท MITRE ATT&CK mapping
Expanded Wazuh alert detail
Expanding an individual alert reveals key details such as the rule triggered, source IP, timestamp, and MITRE ATT&CK classification (T1110 โ€“ Brute Force). This confirms the nature of the activity and provides the necessary context to validate and investigate the threat.
05
Detection Logic
Rule 5760 โ€” sshd: Authentication Failed
Wazuh Management โ†’ Rules โ†’ 5760
Rule 5760
Rule 5760 triggers on each failed SSH authentication attempt. During the attack, repeated failures generate a high volume of alerts, forming the base signal used to identify abnormal authentication patterns during the attack.