security-studies.net

home security lab

Status: In Progress | Tools: VirtualBox, Kali Linux, Security Onion, Nmap, OpenVAS, Metasploit

project goal

Setup a home security lab using virtual machines to simulate a real-world network, and then conduct 4 tests inside this lab environment.

hardware requirements

software stack

lab architecture

[Windows 10 Host Machine]
|
| - VM 1: Kali Linux (Attack Platform)
|
| - VM 2: Windows 10 Client (Target)
|
| - VM 3: Security Onion (Monitoring/SIEM)

Platform Choice: Kali Linux selected for familiarity and comprehensive built-in toolset. Security Onion chosen as free, open-source, industry-standard SIEM solution.

VirtualBox showing Windows 10 and Kali Linux VMs running, with OPNSense router dashboard accessed within Kali Linux demonstrating network connectivity
Complete lab environment: Windows 10 target, Kali Linux attack platform, and OPNSense router dashboard showing successful network integration

security tests conducted

test #1: port scanning with nmap

Comprehensive port discovery and service enumeration against the Windows 10 target VM.

Command executed:

nmap -sV -p- <IP_of_Windows_10_VM>

Analysis: Nmap scans all 65,535 ports to identify open services, like checking for unlocked doors on a building. The -sV flag provides service version detection for vulnerability assessment.

Key Findings: Multiple unnecessary ports discovered open, indicating misconfigurations in the target system setup.

Critical open ports identified:

test #2: vulnerability scanning

Comprehensive vulnerability assessment using OpenVAS for deeper security analysis.

OpenVAS installation and setup:

sudo apt update
sudo apt install openvas
sudo gvm-setup
sudo gvm-feed-update

Scan configuration:

Scan Types:

Results: Multiple high-severity vulnerabilities discovered requiring immediate attention and patching.

vulnerability remediation

VulnerabilityMitigationAction Taken
MS17-010 EternalBlueDisable SMBv1Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol
Additional CVEsSystem UpdatesWindows Update deployment and configuration hardening

Verification: Post-remediation scan confirmed successful mitigation of all identified vulnerabilities.

test #3: metasploit exploitation

Exploitation testing against known vulnerabilities using the Metasploit framework.

Status: Documentation in progress

bonus test: logging simulation

Implementation of comprehensive logging and detection capabilities using Wazuh and Sysmon.

Status: Planning phase

learning outcomes

next steps


← back to projects