[NEW] Building My Own Cybersecurity Virtual Lab: Pentesting,

 


I recently built a new lab using VirtualBox because my previous setup on EVE-NG was slow and often froze. With VirtualBox, my experience is much smoother, and all devices run simultaneously without issues.

This diagram provides a simple overview of my lab setup. On the adversary side, we have the attacker system running Kali Linux, along with our Command and Control (C2) server using Mythic.

On the other side, we have the target devices and the SOC environment. For our SIEM solution, I chose Elasticsearch. And a Fleet server that is responsible for managing Elastic Agents, handling their deployment, and forwarding logs to the Elasticsearch server. Additionally, the lab includes a Windows Server and an Ubuntu Server.

In my next post, I’ll walk through the installation of Sysmon and its integration with Elasticsearch SIEM.


Comments

Popular posts from this blog

Deploying Sysmon on Windows and Integrating with Elasticsearch SIEM

Installing Suricata IDS/IPS and Triggering Rules with an Nmap Stealth Scan and XSS Attack on bWAPP Using Burp Suite

Boss of the SOC v1 (2015) Website Defacement