π‘οΈ SecOps Lab β Network Security Operations Simulator
SecOps Lab is a comprehensive, interactive network security operations simulator that brings together five critical security domains in one unified interface: Network Flow Analysis & UBA (User Behavior Analytics), Wireshark Packet Capture Simulation, EDR (Endpoint Detection & Response), DHCP Server Management, and DNS Firewall Configuration. Built with pure HTML/CSS/JavaScript, this educational tool allows security professionals, students, and IT administrators to practice real-world security operations in a safe, simulated environment β no actual network equipment required. π
π 5 Interactive Security Modules
Module
Focus
Key Capabilities
01 β Flow & UBA
Network Monitoring
Real-time flow visualization, anomaly detection, user behavior analytics, DDoS simulation, threat correlation
02 β Wireshark
Packet Analysis
Live packet capture simulation, TCP 3-way handshake, protocol filtering, hex dump viewer, packet dissection
03 β EDR
Endpoint Security
Endpoint management, malware scanning, patch management, MFA setup, threat remediation
04 β DHCP
Network Services
IP address pool visualization, lease management, exclusion ranges, scope configuration, DHCP server simulation
05 β DNS Firewall
Network Security
Windows Firewall outbound rules, DNS query testing, rule management, traffic flow visualization
π Module 01: Flow & UBA β Network Flow Analysis & User Behavior Analytics
Real-Time Network Monitoring π
Live flow visualization β animated network graph with real-time traffic spikes
Baseline threshold β visual indicator for normal vs abnormal traffic
6 KPI metrics : Flows/sec, Packets/sec, Anomalies, Alerts
Flow table with 10+ data points per flow:
Time, Source IP, Destination IP, Protocol
Source/Destination Ports, Packets, Bytes
Duration, Flow Type, Status
Automated anomaly alerts with severity indicators (CRITICAL/HIGH)
DDoS simulation β SYN flood attack with multiple source IPs
Data exfiltration detection β large outbound transfers to foreign IPs
Real-time alert feed with timestamps and protocol details
User Behavior Analytics (UBA) π€
4 user profiles with risk scoring (0-100)
Risk color coding : π΄ >70 (Critical), π‘ 40-70 (Warning), π’ <40 (Normal)
Anomaly detection for off-hours access, IP mismatch
Breach simulation β account compromise + data exfiltration scenario
Threat Detection Matrix β οΈ
4 threat categories : DDoS, Data Exfiltration, Insider Threat, Account Compromise
MITRE ATT&CK-aligned indicators
Incident Correlation Engine β links network flows with UBA signals
Automated response recommendations (lock account, alert SOC, preserve logs)
π‘ Module 02: Wireshark β Packet Capture Simulation
Simulated interface selection (Wi-Fi, Ethernet, Loopback)
Capture filter support (tcp, udp, dns, http, icmp, arp, tls)
Start/Stop capture with auto-generation every 600ms
Realistic packet timing with microsecond precision
Column
Description
#
Packet sequence number
Time
Timestamp since capture start
Source/Destination
IP addresses
Protocol
TCP, UDP, DNS, HTTP, ICMP, ARP, TLS
Length
Packet size in bytes
Info
Packet summary with flags/details
Protocol
Color
Example
TCP
Blue
SYN, ACK, SYN-ACK handshake
UDP
Green
mDNS, DNS queries
DNS
Amber
A record queries/responses
HTTP
Cyan
GET requests
ICMP
Purple
Ping echo request/reply
TLS
Pink
Client/Server Hello
ARP
Orange
MAC resolution
Tree view with expandable protocol layers:
Frame details
Ethernet II (MAC addresses)
Internet Protocol v4 (IP addresses, TTL)
TCP/UDP (ports, flags, sequence numbers)
Application layer (DNS queries, HTTP requests)
Hex dump with byte-by-byte representation
ASCII translation for payload inspection
TCP 3-Way Handshake Visualization π€
Interactive diagram showing SYN β SYN-ACK β ACK flow
Color-coded arrows for each handshake step
Real-time status indicator when connection established
HTTP/HTTPS traffic β simulate web browsing
DNS queries β A, AAAA, MX, NS record lookups
UDP streams β mDNS, other UDP traffic
π‘οΈ Module 03: EDR β Endpoint Detection & Response
Endpoint Management π₯οΈ
5 endpoints with detailed information:
Hostname, OS, IP address
Status (Protected / Threat Detected)
Risk scoring, patch count, last scan time
Threat detection with red highlighting
Endpoint icons : Windows, Ubuntu, macOS
Metric
Count
Endpoints
5
Protected
Dynamic
Threats
Dynamic
Patches Due
5
5 pending patches with severity ratings:
π΄ Critical β CVSS 9.0+
π High β CVSS 7.0-8.9
π‘ Medium β CVSS 4.0-6.9
CVE identifiers and release age
One-click install with progress feedback
Batch install for all critical patches
Target endpoint selection
Scan types : Quick, Full System, Custom Path
Simulated scanning with progress bar
Threat detection results :
Trojan.GenericKD.68147
PUP.Optional.Bundler
Quarantine & remediation actions
Scan statistics : Files scanned, threats found, duration
QR code simulation for authenticator app pairing
TOTP code verification (6-digit demo)
Secret key display (JBSWY3DPEHPK3PXP)
π Module 04: DHCP β Dynamic Host Configuration Protocol
IP address pool visualization β 192.168.1.2β254
Color-coded cells for address states:
π’ Available β Free IP addresses
π΅ Leased β Currently assigned
π΄ Excluded β Reserved for static IPs
π‘ Reserved β MAC-based reservations
Hover tooltips showing IP details and lease info
Scope Configuration βοΈ
Scope name, range, subnet mask
Lease duration (default: 8 days)
Gateway (Option 3) and DNS servers (Option 6)
Scope activation with toast notification
Lease table with:
Client IP, Hostname
MAC address
Expiration date
Lease type (Dynamic/Reserved)
Define exclusion ranges for static IP devices
6 printers excluded (192.168.1.2β7)
Add/remove exclusions dynamically
Real-time pool updates
Option 003 β Router (Gateway): 192.168.1.1
Option 006 β DNS Servers: 8.8.8.8, 8.8.4.4
Option 015 β DNS Domain Name: corp.local
Address Reservations π
MAC-based IP reservations for:
Printers (static IPs)
Gateway (192.168.1.1)
New reservation creation workflow
DHCP Server Installation Wizard πͺ
7-step installation process :
Open Server Manager
Add Roles and Features
Select Installation Type
Select Server
Select DHCP Server Role
Confirm and Install
Completion
Auto-complete function for quick lab completion
π₯ Module 05: DNS Firewall β Windows Firewall Management
7-step guided tutorial for creating Windows Firewall outbound rules:
Open Windows Firewall
Advanced Settings
Outbound Rules
New Rule Wizard
Select Port Type (UDP 53)
Set Action (Block)
Name the Rule
Step tracking with visual progress indicators
Interactive completion with "Next Step" button
Outbound Rule Management π
Create custom rules with:
Rule type (Port/Program)
Protocol (TCP, UDP, Both)
Port number (default: 53)
Action (Allow/Block)
Custom rule name
Rule list with:
Enabled/disabled status
Protocol and port details
Action badges (ALLOW/BLOCK)
Enable/disable toggles
Delete functionality
DNS Traffic Flow Visualization π
End-to-end flow diagram :
Endpoint β Firewall β DNS (port 53) β Internet
Dynamic color coding :
π’ Green β Traffic allowed
π΄ Red β Traffic blocked
Real-time status text reflecting current rules
Test any domain (google.com, etc.)
DNS record type selection (A, AAAA, MX, NS)
Query results with:
β
Resolved β Returns simulated IP address
β Blocked β Windows Firewall denies port 53 traffic
Live log with timestamps and query results
Security Operations Center Aesthetic π₯οΈ
Dark background (#0a0e1a) β professional SOC environment
Red accent (#ef4444) for critical alerts and threats
Cyan (#06b6d4) for network flows and TCP
Green (#10b981) for success and allowed traffic
Amber (#f59e0b) for warnings and DNS
Blue (#3b82f6) for protocols and endpoints
Fira Code β Monospace for tables, packet data, code
Inter β Sans-serif for UI elements and labels
Live indicator β pulsing green dot
Toast notifications β user feedback with color coding
Progress bars β scan progress, patch installation
Color-coded badges β severity indicators
Hover tooltips β IP pool cells
Animated flow graph β real-time network traffic visualization
Packet capture table β scrolling with selection highlighting
π οΈ Technical Implementation
Pure HTML5/CSS3/JavaScript β No frameworks or dependencies
Canvas API β Real-time flow visualization
LocalStorage β Not used (session-only simulation)
Component
Purpose
Features
Flow Canvas
Traffic visualization
Animated graph, baseline threshold
Packet Table
Wireshark simulation
Filtering, selection, dissection
EDR Endpoints
Endpoint management
Status tracking, risk scoring
DHCP Pool
IP address visualization
Color-coded cells, hover tooltips
DNS Firewall
Rule management
Create/edit/delete, enable/disable
// Flow & UBA
addFRow ( ) // Add network flow record
simDDoS ( ) // Simulate DDoS attack
addAnomaly ( ) // Add anomaly alert
simBreach ( ) // Simulate account compromise
renderUBA ( ) // Render user behavior analytics
updateCorr ( ) // Update threat correlation
// Wireshark
startCap ( ) // Start packet capture
stopCap ( ) // Stop packet capture
applyFilter ( ) // Apply display filter
selPkt ( ) // Select packet for dissection
renderPktDetail ( ) // Render packet tree and hex dump
genHTTP ( ) // Generate HTTP/HTTPS traffic
genDNS ( ) // Generate DNS queries
genUDP ( ) // Generate UDP streams
// EDR
renderEDR ( ) // Render EDR dashboard
instPatch ( ) // Install security patch
runScan ( ) // Run malware scan
verifyMFA ( ) // Verify MFA code
// DHCP
renderDHCP ( ) // Render DHCP manager
addExcl ( ) // Add exclusion range
rmExcl ( ) // Remove exclusion
autoInstall ( ) // Auto-install DHCP server
// DNS Firewall
createRule ( ) // Create firewall rule
toggleRule ( ) // Enable/disable rule
delRule ( ) // Delete rule
updateFW ( ) // Update firewall visualization
testDNS ( ) // Test DNS query with rules
advWiz ( ) // Advance lab wizard
π₯ Video Demo Script (60-75 seconds)
Time
Module
Scene
Action
0:00
Flow & UBA
Canvas
Show real-time flow spikes
0:05
Flow & UBA
DDoS
Click "Simulate DDoS" β 20 anomalous flows appear
0:10
Flow & UBA
Alerts
Alert feed shows "DDoS β SYN flood"
0:15
Wireshark
Capture
Start capture β 3 packets auto-generate
0:20
Wireshark
TCP Handshake
Show TCP 3-way handshake diagram
0:25
Wireshark
Packet Details
Click SYN packet β Tree view expands
0:30
EDR
Endpoints
Show 5 endpoints, 2 with threats
0:35
EDR
Scan
Run malware scan β Progress bar to 100%
0:40
EDR
Results
2 threats found β Quarantine
0:45
DHCP
IP Pool
Show color-coded IP cells (green/blue/red)
0:50
DHCP
Leases
Show active leases table with hostnames
0:55
DNS Firewall
Wizard
Click through 7-step wizard
1:00
DNS Firewall
Create Rule
Create block rule for port 53
1:05
DNS Firewall
Test
Query google.com β BLOCKED response
1:10
Toast
Feedback
Success message appears
Load Time : < 1 second (no external dependencies)
Memory Usage : < 50 MB
Animation : Canvas-based flow graph (60fps)
Real-time Updates : Simulated packet generation (600ms intervals)
SecOps Lab is a completely safe educational simulator:
β
No actual network connections
β
No real packet capture
β
No system modifications
β
All data simulated in-browser
β
Pure HTML/CSS/JavaScript
β
Educational purposes only β learn security operations safely
MIT License β see LICENSE file for details.
Wireshark β Packet dissection inspiration
Xcitium OpenEDR β Endpoint detection and response concepts
Microsoft DHCP Server β Scope and lease management
Windows Defender Firewall β Outbound rule configuration
MITRE ATT&CK β Threat framework alignment
Last updated: March 2026