Skip to content

mark-nirdesh/Ultimate-SOC--LAB

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

Ultimate-SOC-LAB

H0L@ guys, the main question is why this lab. I would be straightforward.

  • Dont worry none of the words is AI generative
  1. To show my skills, knowledge and experience that is of interest i.e SOC Analyst
  2. Exploring the different tools required in the Blue team so that you can learn more about the Red/Purple team while on the job.
  3. Contributing to get a job without certifications in the Industry which is quite hard, and I have never chosen an easy path. !
    Image 1. This is where we are heading it's a never-ending process so bear with me!

Phase 1 Proxmox 8.1.4 PVE

  1. Find the Hardware
    • I am using the Acer Aspire XC-885 series given the below specification


      Image 1.1 screenshot from the Dashboard of Proxmox running PVE

  2. Download Proxmox iso file latest(8.1.4)
  3. Make USB bootable with your favourite bootable software- RUFUS
  4. Boot from USB and Install Proxmox.(basic installation is not covered just important parts covered)
  5. Install it like Linux OS and it will be available on machine.IP-address:8006

Phase 2

  1. Download the ISO images and Upload them to the Proxmox hard drive.
    Image 2.1 screenshot from the ISO images on Proxmox Storage

  2. Configure the Linux Bridge.

    Image 2.2 You can choose your private IP range* try your networking skills!

Phase 3 pfsense firewall

  • install pfsense firewall ISO with Network adapter as Linux bridge
  • we can access the firewall with CLI and WEB_GUI= ip.address
  • Create Interfaces for VLANs vlan10, vlan20, vlan30
  • Create firewall rules for each VLAN

  • Enable DHCP for each VLANs you can choose your IP range(* try your subnetting skills)

Phase 4 Install Kali, Parrot OS, and Ubuntu Server at your desired VLANs

Phase 4 Create VM with Vulnerable machine from Vulnhub.com at your honey pot VLAN

  1. You can choose your machine as you want
  • You can try solving this box , This will give you peneration testing hands-on with privlage escalation, finding vulneralibities by open ports and services on that particilar machine
    -> I choose 5 machines as follows
    Machine 5: Breakout
    Machine 4: Metasploitable-linux-2.0.0
    Machine 3: ICA1
    Machine 2: Earth
    Machine 1: Matrix

Phase 5 Setting up sensor or agents to get telemtry or logs on SIEM i.e. splunk or Wazuh

  • We can't start penetration testing on the box as we havent setup the agents on the machine
  • As we don't know the username and password we cant login and get setup the agents or sensor or forwarder.
  • so what we can do? think about it and then get to here for next step.

About

Proxmox 8.1.4 PVE

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published