A hands‑on Security Operations Center home lab built using Splunk, Windows 10, Kali Linux, Sysmon, and real attack simulations.
- Overview
- Architecture
- Objectives
- Tools & Technologies
- Lab Topology
- Deployment Steps
- VirtualBox Environment Setup
- Splunk Enterprise Installation
- Universal Forwarder Setup
- Sysmon Deployment
- Data Onboarding in Splunk
- Kali Linux Attack Simulation
- Detection Engineering (SPL)
- Incident Investigation
- Splunk Searches
- Results & Findings
- Future Improvements
This project documents the creation of a complete SOC Home Lab using VirtualBox, Splunk Enterprise, Windows 10, Kali Linux, and Sysmon. The goal is to simulate real‑world SOC workflows including log ingestion, detection engineering, threat simulation, and incident investigation.
- VirtualBox hypervisor
- Windows 10 VM (monitored endpoint)
- Kali Linux VM (attacker machine)
- Splunk Enterprise Server
- Splunk Universal Forwarder
- Sysmon for detailed endpoint telemetry
- Build a functional SOC environment
- Collect and analyze Windows logs using Splunk
- Deploy Sysmon for high‑fidelity telemetry
- Simulate real‑world attacks from Kali Linux
- Create SPL‑based detections
- Investigate suspicious activity end‑to‑end
- Document findings and lessons learned
- This project documents the creation of a complete SOC Home Lab using VirtualBox, Splunk Enterprise, Windows 10, Kali Linux, and Sysmon.
- The goal is to simulate real‑world SOC workflows including log ingestion, detection engineering, threat simulation, and incident investigation.
- Virtualisation = VirtualBox
- SIEM = Splunk Enterprise
- Endpoint = Windows 10
- Attacker = Kali Linux
- Logging = Sysmon, Windows Event Logs
- Forwarding = Splunk Universal Forwarder
- Simulation = Nmap, Metasploit, Powershell abuse, Hydra
- Analysis = SPL, Dashboards, Alerts
- Installed VirtualBox
- Created Windows 10 VM
- Created Kali Linux VM
- Configured host-only netowrking for isolated traffic
- Installed Splunk on Windows
- Configured admin credentials
- Enabled receiving on port 9997
- Verified Splunk Web access
- Installed Splunk universal forwarder on Windows 10
- Configured forwarding to Splunk server
- Verified connection using: splunk list forward-server
-
Onboarded:
-
Sysmon logs
-
Security logs
-
Powershell logs
-
Application logs
-
Verified logs in:
-
index=wineventlog
-
index=sysmon
- Simulated attacks included:
- Nmap scanning
- Brute force attempts(Hydra)
- Malware exe file creation in Kali linux
- Powershell exploitation
- Created SPL Alerts for:
- Suspicious Pwershell commands
- Sysmon Event ID 1 anomalies
- Multiple failed logons
- Reverse shell behaviour
- Network scanning patterns
- Documented:
- Alerts triggered
- Timeline of events
- Affected user and host
- Root cause analysis
- Response actions taken
-
Spl
-
index=sysmon EventCode=1
-
| search Image="*powershell.exe"
-
| stats count by CommandLine, ParentImage, Computer
-
Network Scanning Detection
-
Spl
-
index=sysmon EventCode=3
-
| stats count by DestinationIp, DestinationPort
-
| where count > 50
- Successfully ingested Sysmon and Windows logs
- Detected multiple attack patterns from Kali linux
- Built custom SPL detections
- Investigated alerts end-to-end
- Improved understanding of endpoint telemetry and SOC workflows