This project demonstrates the design and implementation of a complete Security Operations Center (SOC) Home Lab. It simulates a real-world enterprise environment with centralized logging, endpoint monitoring, Active Directory, and attack detection using Splunk SIEM.
- Build a real-world SOC environment
- Collect and analyze logs using Splunk
- Simulate attacks (Brute Force & MITRE ATT&CK)
- Detect threats using SIEM queries
- Understand enterprise security monitoring
- Splunk Server (Ubuntu) → SIEM & Log Analysis
- Windows Server (ADDC-01) → Domain Controller
- Windows 10 (target-PC) → Endpoint Machine
- Kali Linux (192.168.10.100) → Attacker Machine
| System | IP Address | Role |
|---|---|---|
| Splunk Server | 192.168.10.10 | SIEM |
| AD Server (ADDC-01) | 192.168.10.7 | Domain Controller |
| Windows 10 | 192.168.10.100 | Target Machine |
| Kali Linux | 192.168.10.250 | Attacker |
- Installed Splunk Enterprise on Ubuntu
- Configured receiving port (9997)
- Created index (
endpoint)
👉 Click here for Windows 10 Setup
- Installed Windows 10
- Installed Splunk Universal Forwarder
- Installed Sysmon + configuration
- Configured
inputs.conf
- Installed AD DS
- Created domain:
rocky.local - Created OUs: HR, IT
- Created users:
jsmith(HR)asingh(IT)
- Joined Windows 10 to domain
👉 Click here for Attack Detection
- Performed brute force using Hydra
- Generated:
- Event ID 4625 (failed login)
- Event ID 4624 (successful login)
- Detected attack using Splunk
👉 Click here for Atomic Red Team
- Simulated MITRE ATT&CK techniques:
- T1059 (PowerShell Execution)
- T1003 (Credential Dumping)
- Detected logs in Splunk
index=endpoint EventCode=4625
index=endpoint EventCode=4624
index=endpoint EventCode=4625
| stats count by src_ip, user
| where count > 5
index=endpoint "powershell"
| Event ID | Description |
|---|---|
| 4624 | Successful Login |
| 4625 | Failed Login |
| 1 (Sysmon) | Process Creation |
- Real-world SOC simulation
- Centralized logging (Splunk SIEM)
- Endpoint monitoring (Sysmon)
- Active Directory integration
- Attack simulation (Hydra & Atomic Red Team)
- Detection queries (SOC level)
- Brute force attack detection
- MITRE ATT&CK simulation
- Domain-based authentication logs
- Real-time log monitoring
- SIEM (Splunk)
- Log Analysis
- Threat Detection
- Active Directory Administration
- Incident Investigation
- MITRE ATT&CK Framework
This project demonstrates the implementation of a complete SOC lab with attack simulation and detection capabilities. It provides hands-on experience with SIEM tools, Active Directory, and threat detection techniques used in real-world cybersecurity environments.
Rakesh A R
Aspiring Cybersecurity Analyst
https://www.linkedin.com/in/rakesh-a-r-595517288
