🛡️ Incident Response Suite

⚠️ WARNING: These are defensive cybersecurity tools for incident response. Use only on systems you own or have explicit permission to secure.

📋 Overview

Complete 4-phase incident response automation suite designed to run from operator machine and execute commands remotely via SSH.

✅ New Architecture: These scripts run on your operator machine and connect via SSH to execute commands on the target host. All logs are stored locally on the operator machine for centralized analysis.

🚀 Deployment Workflow

# Step 1: Deploy IR lockdown on target host (creates 'ir' user with SSH access) curl -sSL https://pizzeri.app/ir_lockdown.sh | sudo bash # Step 2: On operator machine, download IR scripts wget https://pizzeri.app/ir/phase1.sh wget https://pizzeri.app/ir/phase2.sh wget https://pizzeri.app/ir/phase3.sh wget https://pizzeri.app/ir/phase4.sh chmod +x phase*.sh # Step 3: Execute phases remotely from operator machine ./phase1.sh target-host.company.com ./phase2.sh target-host.company.com ./phase3.sh target-host.company.com ./phase4.sh target-host.company.com

🌐 For pfSense/FreeBSD Systems

# Use FreeBSD-compatible lockdown script fetch -o - https://pizzeri.app/ir_lockdown_freebsd.sh | sudo sh

📑 IR Phases

Phase 1: Discovery & Assessment

Comprehensive system triage, network discovery, user assessment, and threat hunting executed remotely.

📥 Download phase1.sh
./phase1.sh target-host.company.com

Phase 2: Containment & Eradication

Immediate threat containment, process termination, network isolation, and malware removal executed remotely.

📥 Download phase2.sh
./phase2.sh target-host.company.com

Phase 3: Recovery & Hardening

System recovery, security hardening, service restoration, and configuration updates executed remotely.

📥 Download phase3.sh
./phase3.sh target-host.company.com

Phase 4: Monitoring & Prevention

Continuous monitoring setup, threat detection, alerting, and long-term prevention deployed remotely.

📥 Download phase4.sh
./phase4.sh target-host.company.com

📊 Features

💡 Log Location: All scripts create detailed logs on the operator machine under ./incident_response/<target-host>/ for centralized audit trails and analysis.

🔧 Quick Download All

# Download all phases to operator machine wget https://pizzeri.app/ir/phase1.sh wget https://pizzeri.app/ir/phase2.sh wget https://pizzeri.app/ir/phase3.sh wget https://pizzeri.app/ir/phase4.sh # Make executable chmod +x phase*.sh # Execute phases remotely ./phase1.sh target-host.example.com

📁 Log Structure (on operator machine)

./incident_response/ └── <target-host>/ ├── phase1-discovery/ │ ├── phase1-discovery_20250805_143021.log │ ├── phase1-discovery_summary_20250805_143021.txt │ └── [evidence files from target] ├── phase2-containment/ ├── phase3-recovery/ └── phase4-monitoring/

🔍 Remote Monitoring

After Phase 4 completion, monitor the target system remotely:

# View security alerts from target ssh ir@target-host 'tail -f /var/log/security_alerts.log' # Run threat hunting on target ssh ir@target-host '/opt/ir_monitor/scripts/threat_hunt.sh' # Check monitoring status ssh ir@target-host '/opt/ir_monitor/scripts/security_monitor.sh'
🎯 Perfect for: SOC analysts, incident responders, and security teams who need to remotely secure and monitor multiple compromised hosts from a central operator workstation.

Generated: $(date) | Version: 2.0 | Architecture: Remote Execution