What is a cyberattack? What does it look like? What does it mean to be â€œhackedâ€? For several months, I have made myself vulnerable to these attacks, gathered and analyzed as much of this data as possible in useful, and informative ways.
Through the implementation of an extensive network of vulnerable machines located around the world, I spent the semester monitoring, collecting data, and iterating on the architecture of the vulnerability in order to glean as much information as possible about what it is to be under attack, and what is involved in the state of vulnerability.
The rapid pace of hacker innovation combined with a steep learning curve for many outside of the front lines leaves many systems in vulnerable positions. This project offers a series of simple tools and learning experiences that approach these topics from simplistic perspectives, and may be used by any individual wishing to gain an understanding of how, when, and why they may fall victim to a threat.