π‘ My Cybersecurity Home Lab Mini SOC Environment
Over the past few months, I built a fully virtualized home lab designed to mimic a real SOC environment combining offensive testing, defensive monitoring, and layered security.
It gives me hands-on experience in threat hunting, network defense, alert correlation, and overall SOC workflows
π§ Lab Setup Includes:
β’π Kali Linux β Recon & exploitation
β’π§ Ubuntu (Wazuh) β SIEM for monitoring & correlation
β’π‘ pfSense β Firewall + segmentation
β’π§ͺ Suricata IDS/IPS β Threat detection & active blocking
β’πͺ Windows Server AD β Domain & user management
β’π― Metasploitable β Vulnerable target for testing
π― Key Achievements:
β’π¨ Detected Nmap stealth scans with custom Suricata rules
β’π« Blocked malicious traffic using IPS mode
β’π Identified brute-force attempts via Wazuh alerts
β’π΅οΈββοΈ Flagged Mimikatz credential dumping (MITRE T1003.001)
β’π Correlated pfSense β Suricata β Wazuh logs for validation
β’π‘ Set up FIM, vulnerability scans, and log-based detections
β’π Built a practical layered defense similar to real SOC environments
π Open to connecting with SOC analysts, cybersecurity pros, and recruiters letβs collaborate and grow together
#CyberSecurity #SOC #SIEM #ThreatHunting #Wazuh #Suricata #pfSense #ActiveDirectory #MITREATTACK
Share this Scrolly Tale with your friends.
A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.
