0b1d1 Profile picture
Nov 15 11 tweets 5 min read Read on X
💡 My Cybersecurity Home Lab Mini SOC Environment

Over the past few months, I built a fully virtualized home lab designed to mimic a real SOC environment combining offensive testing, defensive monitoring, and layered security. Image
It gives me hands-on experience in threat hunting, network defense, alert correlation, and overall SOC workflows

🔧 Lab Setup Includes:
•🐉 Kali Linux – Recon & exploitation
•🐧 Ubuntu (Wazuh) – SIEM for monitoring & correlation
•🛡 pfSense – Firewall + segmentation
•🧪 Suricata IDS/IPS – Threat detection & active blocking
•🪟 Windows Server AD – Domain & user management
•🎯 Metasploitable – Vulnerable target for testing
Image
Image
Image
Image
Image
Image
Image
Image
Image
Image
Image
Image
Image
Image
Image
Image
Image
Image
Image
Image
🎯 Key Achievements:
•🚨 Detected Nmap stealth scans with custom Suricata rules
•🚫 Blocked malicious traffic using IPS mode
•🔐 Identified brute-force attempts via Wazuh alerts
•🕵️‍♂️ Flagged Mimikatz credential dumping (MITRE T1003.001)
•🔄 Correlated pfSense → Suricata → Wazuh logs for validation
•🛡 Set up FIM, vulnerability scans, and log-based detections
•📊 Built a practical layered defense similar to real SOC environments
🔗 Open to connecting with SOC analysts, cybersecurity pros, and recruiters let’s collaborate and grow together

#CyberSecurity #SOC #SIEM #ThreatHunting #Wazuh #Suricata #pfSense #ActiveDirectory #MITREATTACK

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with 0b1d1

0b1d1 Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @_0b1d1

Nov 15
🛡️ 100+ Hands-On Cybersecurity Projects 🚀

Cybersecurity isn’t just about certifications it’s about real-world skills. I’ve curated 100+ projects that let you tackle Red & Blue Team scenarios, incident response, and threat analysis just like in a real SOC. Image
Image
Image
Image
What You’ll Gain:
🔹 Practical Red & Blue Team experience
🔹 Real-world detection, analysis & response skills
🔹 Hands-on use of popular cybersecurity tools
🔹 Portfolio-ready projects for job interviews
Image
Read 4 tweets
Nov 13
🌐 What is DNS?

DNS (Domain Name System) is basically the 📖 phone book of the internet.
It translates human-friendly domain names (like ) into machine readable IP addresses (like 142.250.190.78) so computers can find each other across the network. google.comImage
🧠 Why Do We Need DNS?
Humans remember names easily not numbers
Instead of typing an IP address every time, you just enter a domain name, and DNS automatically finds the right IP for you. ✨
⚙️ How DNS Works (Step-by-Step)
1️⃣ You type a website name →
2️⃣ 💾 Local Cache Check: Your computer first checks its local DNS cache (recently visited sites)
3️⃣ 🌍 DNS Resolver: If not found it asks a DNS resolver (like your ISP or Google’s DNS — 8.8.8.8)example.com
Read 10 tweets
Nov 12
🔒 SOC Analyst (L1–L2) Preparation Guide 📘

💬 Comment “PDF” if you’d like to get the guide!

I’ve just uploaded a comprehensive PDF guide designed for anyone preparing to become a Cybersecurity / SOC Analyst (Level 1–2). Image
This guide covers everything you need to build strong fundamentals and get ready for real-world SOC operations:
✅ Core SOC Concepts & Workflows
🧠 Common Tools (SIEM, EDR, Threat Intel, etc.)
⚙️ Daily Analyst Responsibilities
🚨 Incident Detection & Response Basics
🔍 Practical Tips to Boost Your Blue Team Skills
Read 21 tweets
Nov 11
Introduction to Firewall

A firewall is a network security device or software designed to monitor, filter, and control incoming and outgoing network traffic according to predefined security rules.

💡 Comment PDF for full guide Image
Its main goal is to create a protective barrier between a trusted internal network and untrusted external networks, such as the internet, safeguarding systems from unauthorized access and cyber threats
🔹 Purpose of a Firewall
•Protects computers and networks from malware, hackers, and unauthorized intrusions.
•Ensures that only legitimate and safe data traffic passes through.
•Serves as the first line of defense in any network security architecture
Read 22 tweets
Nov 11
🔐 Ethical Hacking Uncovered The Complete Beginner-Friendly Guide

Cybersecurity isn’t optional anymore it’s the backbone of digital safety in today’s world.

📩 Comment “PDF” for the full guide. Image
💡 What You’ll Learn:
✅ How cyber attacks actually happen
✅ How ethical hackers defend systems
✅ The real penetration testing workflow
✅ Essential tools inside Kali Linux
✅ Google Dorking & reconnaissance fundamentals
✅ Malware, phishing, and modern cyber threats
✅ How to start your career in cybersecurity

If you’re planning to grow in Ethical Hacking or Cybersecurity, this is a solid starting point.

📘 Resource: Ethical Hacking Learning Penetration Testing with Kali Linux
Read 30 tweets
Nov 10
🚀 New Release: Personal Git Mastery
📩 Comment “PDF” below to get your copy!

Whether you’re a beginner trying to tame Git or an educator looking for a structured, pedagogy-first resource this book is built for fearless learners Image
📘 From “Hello World” to branching, merging, and rebasing, every chapter is an actionable step.
🎮 Includes a fun mini game “Error Hunter” that gamifies common Git mistakes
🧠 What makes it different:
•Focus on the version control mindset, not just commands
•Pedagogical strategies for teaching Git effectively
•GitHub Codespaces integration for cloud-based practice
•Project hygiene and debugging best practices
Read 25 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(