Lab introduction
This lab is guided and inspired by MyDFIR youtube channel. It is part of the 30 Day SOC challenge aimed to build practical SOC-analyst skills.
In this lab exercise, I build a miniature SOC lab with ELK Stack using the Google Cloud Platform (GCP). The purpose of this exercise is to practice implementing offensive and defensive strategies, by dealing with real-world attacks, and setting up countermeasures to tackle those attacks.
Important tools and services I’ll be using are:
- ELK Stack
- GCP - Google Compute Engine
- Draw.io
- Microsoft Windows Server 2022
- Ubuntu Server 24.04 LTS
- Microsoft sysinternals - Sysmon
- Mythic C2
- osTicket
Things I’ll be doing:
- Draw diagrams and plan out the process
- Setup and configure Elasticsearch and Kibana
- Setup log ingestion from endpoints
- Attack, detect, and investigate malware (SSH & RDP brute force)
- Command and Control (C2) over RDP using Mythic
- Create alerts and dashboards on Kibana
- Setup and integrate a ticketing system
- Investigate alerts and defend attacks
Other tools and services are explained in each step as I go through the process. Let’s get started with the lab!