Skip to content

Set up your own Checkpoint Firewall Home Lab easily with a clear diagram, simple setup instructions, and fun exercises to practice. Dive into configuring, fine-tuning, and solving real-world security challenges for a hands-on learning experience.

Notifications You must be signed in to change notification settings

0xrajneesh/Checkpoint-Firewall-Home-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 

Repository files navigation

Checkpoint Firewall Home-Lab

ℹ️Overview

In this Home Lab, we’ll learn to set up a Checkpoint firewall from scratch. This Lab will help you launch an attack with Nmap, Metasploit & custom scripts from Kali linux and defend your machine using a Checkpoint firewall. Blue Sand White Beach Simple Watercolor Etsy Shop Banner In this home-lab, we will cover:

🧮Requirements

  • Hardware:
    • Computer with at least 16GB RAM and dual-core processor
  • VM/ISO Image:
    • Checkpoint Standalone ISO file
    • Kali Linux OVA file
    • Metasploitable 2
    • Windows 11 OVA file

🖼️Lab Diagram

AttackDefense with Checkpoint FW

</> Setting up the Checkpoint Firewall Home-lab

🧑‍💻Excercises- Network-based attacks

  • Nmap Stealth Scan Detection: Create a Suricata rule to detect TCP SYN packets sent to multiple ports within a short time frame, indicative of Nmap stealth scans.
  • Nmap OS Fingerprinting Detection: Develop a Suricata rule to detect ICMP echo requests and responses with specific TTL values, characteristic of Nmap OS fingerprinting activities.
  • Nmap Service Version Detection Detection: Formulate a Suricata rule to detect Nmap service version detection probes based on unique HTTP GET requests or TCP SYN/ACK packets.
  • Metasploit Exploit Payload Detection: Craft a Suricata rule to detect Metasploit exploit payload traffic based on unique signatures or payloads commonly used in exploits.
  • Metasploit Reverse Shell Detection: Develop a Suricata rule to detect Metasploit reverse shell connections by monitoring for outbound TCP connections to known attacker IP addresses.
  • Metasploit Meterpreter Communication Detection: Create a Suricata rule to detect Meterpreter communication activities by analyzing HTTP or TCP traffic with characteristic Meterpreter payloads.
  • Metasploit Credential Harvesting Detection: Formulate a Suricata rule to detect Metasploit credential harvesting activities by monitoring for specific LDAP or SMB traffic patterns indicative of credential theft.

🧑‍💻Excercises- Real-world Scenarios

  • Deploying Checkpoint in Bridge Mode: Configure Checkpoint Firewall transparently for enhanced security without altering IP addresses, ensuring comprehensive threat protection.
  • Branch office to Data Center Server Access: Establish secure connectivity between branch offices and data centers to ensure seamless access to critical resources while upholding robust security measures.
  • Allow uploading of credit cards numbers by finance and only over HTTPS: Enable secure credit card uploads for finance, enforcing HTTPS protocol to safeguard data integrity during transmission and comply with regulatory standards.
  • Block High-Risk Applications: Proactively restrict access to high-risk applications to mitigate potential security threats and enhance network security posture.
  • Block downloading of sensitive medical information: Prevent downloading of sensitive medical data to uphold compliance with healthcare regulations and safeguard patient confidentiality.
  • Allow Facebook for HR: Grant exclusive Facebook access to HR for internal communication and recruitment purposes while managing social media usage.
  • Monitor all traffic of Tiktok: Analyze TikTok traffic to detect threats, enforce acceptable use policies, and mitigate risks associated with the platform through comprehensive network monitoring.

Need Training

Learn to deploy Checkpoint from scratch, set up the home-lab, and perform the exercises. This training covers all the modules required to pass even CCSA exam and gain advanced security skills.

About

Set up your own Checkpoint Firewall Home Lab easily with a clear diagram, simple setup instructions, and fun exercises to practice. Dive into configuring, fine-tuning, and solving real-world security challenges for a hands-on learning experience.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published