0b1d1 Profile picture
pwn βš”οΈ Β· r3d t34m 🎯 Β· bug hunt (soonβ„’) 🐞 Β· Random Red Guy πŸ”΄ Β· scribbles β†’ https://t.co/FIT9hV6R1A Β· THM β†’ https://t.co/upMQKI5Bbj

Nov 15, 11 tweets

πŸ’‘ My Cybersecurity Home Lab Mini SOC Environment

Over the past few months, I built a fully virtualized home lab designed to mimic a real SOC environment combining offensive testing, defensive monitoring, and layered security.

It gives me hands-on experience in threat hunting, network defense, alert correlation, and overall SOC workflows

πŸ”§ Lab Setup Includes:
β€’πŸ‰ Kali Linux – Recon & exploitation
β€’πŸ§ Ubuntu (Wazuh) – SIEM for monitoring & correlation
β€’πŸ›‘ pfSense – Firewall + segmentation

β€’πŸ§ͺ Suricata IDS/IPS – Threat detection & active blocking
β€’πŸͺŸ Windows Server AD – Domain & user management
β€’πŸŽ― Metasploitable – Vulnerable target for testing

🎯 Key Achievements:
β€’πŸš¨ Detected Nmap stealth scans with custom Suricata rules
β€’πŸš« Blocked malicious traffic using IPS mode
β€’πŸ” Identified brute-force attempts via Wazuh alerts

β€’πŸ•΅οΈβ€β™‚οΈ Flagged Mimikatz credential dumping (MITRE T1003.001)
β€’πŸ”„ Correlated pfSense β†’ Suricata β†’ Wazuh logs for validation
β€’πŸ›‘ Set up FIM, vulnerability scans, and log-based detections
β€’πŸ“Š Built a practical layered defense similar to real SOC environments

πŸ”— Open to connecting with SOC analysts, cybersecurity pros, and recruiters let’s collaborate and grow together

#CyberSecurity #SOC #SIEM #ThreatHunting #Wazuh #Suricata #pfSense #ActiveDirectory #MITREATTACK

Share this Scrolly Tale with your friends.

A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.

Keep scrolling