Overview
A homelab is one of the most valuable investments a cybersecurity student can make.
Rather than relying purely on theoretical knowledge or cloud-based sandboxes, having
a personal environment means I can experiment freely, break things intentionally,
and build muscle memory with real tools.
The goal of this project was to design and build a virtualized security lab
that mirrors, at a small scale, the kind of environment I'd encounter in a real SOC —
with multiple systems generating logs, traffic flowing between segments, and security
tools actively monitoring.
Lab Architecture
Host Machine: [Your hardware specs here — e.g., 16GB RAM, Intel i7, 500GB SSD]
Running a hypervisor to manage multiple VMs simultaneously.
- Hypervisor: [e.g., VirtualBox / VMware Workstation / Proxmox] for managing virtual machines
- Network Segment: Isolated virtual network so lab traffic doesn't touch my home network
- VMs Running: [List your VMs — e.g., Kali Linux, Ubuntu Server, Windows 10, pfSense]
- SIEM: [e.g., Splunk Free / ELK Stack / Wazuh] for log ingestion and analysis
- Traffic Generation: Normal and malicious traffic generated within the lab for analysis practice
[Add a network diagram image here later — or describe the topology in more detail.]
What I Did
- Installed and configured the hypervisor on the host machine
- Created an isolated virtual network with proper IP segmentation
- Deployed Linux VMs and configured SSH access for remote management
- Set up log forwarding from each VM to a central collector
- Configured the SIEM to ingest, parse, and index logs from all sources
- Created initial detection rules to alert on common indicators
# Example: install and start Wazuh agent on Ubuntu VM
curl -s https://packages.wazuh.com/key/GPG-KEY-WAZUH | sudo gpg --no-default-keyring \
--keyring gnupg-ring:/usr/share/keyrings/wazuh.gpg --import
# Start the agent
sudo systemctl start wazuh-agent
sudo systemctl enable wazuh-agent
Results
VMs DEPLOYED
4
Linux + Windows instances
LOG SOURCES
3+
Forwarding to central SIEM
DETECTION RULES
8
Initial ruleset created
UPTIME
Active
Lab runs on demand
[Describe your key findings here — what did the lab reveal, what alerts fired,
what was interesting? Replace this placeholder with your actual results.]
Challenges & How I Solved Them
- [Challenge 1]: Description of what went wrong and how you fixed it.
- [Challenge 2]: Another obstacle and the solution you found.
- [Challenge 3]: What you had to research or learn to overcome it.
Note: This section is important — it shows growth and problem-solving.
Be specific about what broke, what error you saw, and what fixed it.
Screenshots
[Describe what these screenshots document — e.g., "Proxmox dashboard showing all running VMs and resource usage."]
What I Learned
Network Segmentation
How to properly isolate lab traffic from home network using VLANs and firewall rules.
Log Forwarding
Configuring syslog and agents to ship logs to a central collector without packet loss.
SIEM Basics
Creating index patterns, saved searches, and basic correlation rules in a SIEM platform.
VM Management
Snapshots, cloning, and resource allocation for efficient lab workflow.
// Next Steps
- Add a Windows Server VM to practice Active Directory attack/defense scenarios
- Expand detection ruleset to cover more MITRE ATT&CK techniques
- Set up automated traffic generation for continuous alert practice
- Document findings as formal SOC-style incident reports