Skip to content

Starter Projects#

These projects are designed for students and early-career practitioners who want to build practical skills in red teaming, OT/ICS security, and physical security research. Each project is self-contained, uses legal methods, and produces a documented artifact that can serve as a portfolio piece.


Project 1: ICS Network Protocol Lab with Conpot#

Objective: Deploy an ICS honeypot in a local virtual machine, capture and analyze the traffic it generates, and document what an attacker would observe when probing an exposed ICS device.

Rough scope:

  • Set up a Linux VM (Ubuntu or Debian recommended).
  • Install Conpot, an open-source ICS/SCADA honeypot that simulates Modbus, DNP3, and SNMP services.
  • Use Wireshark to capture traffic on the VM's loopback interface while probing the honeypot with tools like Nmap and the Redpoint NSE scripts.
  • Document the protocol traffic, what the probing tools report, and what a defender would see in the logs.

Skills built: ICS protocol familiarity (Modbus, DNP3), network traffic analysis, honeypot configuration, documentation.

Why it matters: Understanding what ICS devices expose to the network is foundational for both attacking and defending them. This project gives you that baseline without touching any real industrial systems.


Project 2: OSINT Profile on a Public Organization#

Objective: Using only publicly available information, build a structured intelligence profile on a publicly traded company or government agency of your choice. Document your methodology and findings.

Rough scope:

  • Choose a target organization with significant public presence (public companies or government agencies are good choices because they have broad public disclosure requirements).
  • Use tools like Shodan, theHarvester, OSINT Framework, and LinkedIn to gather information about the organization's internet-facing infrastructure, employee structure, and technology footprint.
  • Document each step: what you queried, what you found, and what an attacker could infer from it.
  • Include a section on what the organization is doing well and what could be improved from an exposure-reduction standpoint.

Skills built: OSINT methodology, tool usage (Shodan, theHarvester), structured reporting, defensive awareness.

Why it matters: OSINT is the first phase of almost every authorized engagement. This project teaches you to document your process, which is a core professional skill.


Project 3: Home Network Vulnerability Assessment#

Objective: Conduct an authorized assessment of your own home network, document the attack surface, and produce a remediation report.

Rough scope:

  • Map your network with Nmap to identify all connected devices.
  • Run a web vulnerability scan against your router's admin interface using OWASP ZAP or Nikto.
  • Check firmware versions against public CVE databases for your router model.
  • Document your findings in a short report following a standard structure: executive summary, findings (severity-rated), and recommendations.

Skills built: Network scanning, vulnerability research, CVE analysis, report writing.

Why it matters: Writing a professional vulnerability report is a skill that takes practice. Doing it on your own network gives you full authorization and a realistic target. The output is a tangible portfolio artifact.


Project 4: ATT&CK Threat Model for a Fictional Facility#

Objective: Using the MITRE ATT&CK for ICS matrix, build a threat model for a fictional water treatment facility. Map likely adversary techniques, identify detection gaps, and propose mitigations.

Rough scope:

  • Review the ATT&CK for ICS matrix and select 8-10 techniques relevant to water treatment operations (e.g., manipulating setpoints, inhibiting alarms).
  • Use the ATT&CK Navigator to create a visual heat map of covered techniques.
  • For each technique, document: what the attack looks like, what a defender would need to detect it, and one concrete mitigation.
  • Write a one-page executive summary suitable for a non-technical audience.

Skills built: Threat modeling, ATT&CK framework usage, ICS-specific threat thinking, executive communication.

Why it matters: Threat modeling is a core defensive skill that also makes you a better red teamer. Understanding what defenders look for shapes how you think about adversary simulation.


Project 5: Physical Security Observation and Documentation Report#

Objective: Conduct a non-intrusive physical security observation of a public building or campus (library, university building, coffee shop, etc.) and document the observable access control environment.

Rough scope:

  • Choose a publicly accessible location you are legally permitted to be in.
  • Observe and document: entry points, door hardware types (latch type, presence of deadbolts, electric strikes), badge reader types if visible, camera placement, tailgating susceptibility, and visitor management practices.
  • Do not touch, probe, or interact with any security hardware. Observation only.
  • Write a short report documenting what you observed, what security controls are present, and what common physical security weaknesses, if any, are observable.

Skills built: Physical security awareness, professional observation and documentation, report writing.

Why it matters: Physical security assessments begin with reconnaissance. This project builds the observation and documentation habits used in authorized physical engagements while remaining entirely passive and legal.