Home Security Lab

This Home Security Lab serves as a dedicated environment for hands-on technical research, where I bridge the gap between theoretical security concepts and practical implementation. By simulating real-world network architectures and deploying various defensive and offensive security tools, I use this space to rigorously test system vulnerabilities, automate monitoring, and refine incident response protocols. The following documentation outlines the lab’s configuration and the specific projects I have conducted to stay at the forefront of the evolving threat landscape.

The Architecture
1. Virtualization & Infrastructure
  • Hypervisor: I utilize Oracle VirtualBox 7.0+ to manage a local cluster of virtual machines, allowing for rapid snapshotting and rollback during malware analysis.

  • Components: The lab runs on a three-node architecture: a lightweight Ubuntu Server (SIEM), a Windows 11 Enterprise endpoint (Victim), and Kali Linux (Attacker), all hosted on a custom high-performance workstation.

2. Networking & Segmentation
  • Isolation: Instead of traditional VLANs, I utilize VirtualBox Host-Only Networks to create a strictly air-gapped environment. This ensures that live malware detonations and brute-force traffic are physically unable to leak onto my home production network.

  • Dual-Homing: The SIEM server is configured with a dual-adapter setup (NAT + Host-Only), allowing it to ingest internal logs from the isolated lab network while maintaining secure access to external repositories for threat intelligence updates.

3. Defensive Stack (Blue Team)
  • SIEM/Log Management: Splunk Enterprise serves as the central nervous system of the lab, ingesting and indexing real-time data from the victim endpoints.

  • Endpoint Telemetry: The Windows victim is enhanced with Sysmon (using the SwiftOnSecurity configuration) to capture high-fidelity logs that standard Event Viewer misses, such as process creation (Event ID 1) and file creation (Event ID 11).

  • Log Forwarding: A Splunk Universal Forwarder is deployed on the endpoint, configured to bypass local permission restrictions and pipe "Audit Failure" and "Sysmon" logs directly to the SIEM.

4. Offensive & Testing Tools (Red Team)
  • Attack Platform: A dedicated Kali Linux instance serves as the primary workstation, equipped with Hydra for network-based credential attacks (specifically targeting SMBv2) and smbclient for manual enumeration.

  • Malware Simulation: I develop and deploy custom PowerShell scripts to simulate ransomware behavior, specifically testing the Blue Team's ability to detect mass file modification and "ransom note" creation artifacts in real-time.

Project Reports

Detailed write-ups of the infrastructure build and attack analysis.

The Build Guide: A step-by-step breakdown of the VirtualBox, Splunk, and Network configuration used to create this air-gapped lab.

Purple Team Report: A full incident report covering the Hydra brute-force and PowerShell ransomware simulation, including root cause analysis and detection logic.