Vincentius2004/soc-home-lab

GitHub: Vincentius2004/soc-home-lab

一个基于 Wazuh SIEM 模拟 SOC 的实验项目,帮助学习日志分析、威胁检测与事件响应。

Stars: 0 | Forks: 0

# soc-home-lab A lab simulating a Security Operations Center using a SIEM to monitor DVWA. Includes attack scenarios (SQLi, XSS, brute force) and demonstrates log analysis, threat detection, and incident response workflows. # 🛡️ SOC Home Lab — 攻击检测与事件响应 ## Overview Project ini adalah simulasi SOC (Security Operations Center) home lab yang dibangun untuk mempelajari deteksi dan respons terhadap serangan siber. ## Arsitektur Lab | VM | IP | Role | |---|---|---| | Wazuh SIEM | 192.168.217.128 | Manager + Indexer + Dashboard | | Ubuntu Target | 192.168.217.130 | Victim Machine + DVWA | | Kali Linux | 192.168.217.129 | Attacker Machine | ## Stack Teknologi - **SIEM**: Wazuh v4.14 - **IDS/IPS**: Suricata v6.0.4 - **Vulnerable App**: DVWA (Damn Vulnerable Web Application) - **Web Server**: Apache2 + Nginx - **OS Monitoring**: Auditd - **Attacker Tools**: Hydra, hping3, nmap, curl ## Serangan yang Disimulasikan | # | Serangan | Layer | Tool | Rule ID | |---|---|---|---|---| | 1 | SQL Injection | 7 | curl | 100011 | | 2 | XSS | 7 | curl | 100012 | | 3 | Command Injection | 7 | curl | 100013 | | 4 | Directory Traversal | 7 | curl | 100015 | | 5 | File Upload Webshell | 7 | curl | 100053 | | 6 | Reverse Shell | 7 | nc | 100050 | | 7 | SSH Brute Force | 4 | hydra | 5551 | | 8 | Nmap Reconnaissance | 3 | nmap | 86601 | | 9 | DDoS SYN Flood | 4 | hping3 | 86601 | ## Struktur Repository \`\`\` soc-home-lab/ ├── 01-infrastructure/ # Setup dan konfigurasi lab ├── 02-wazuh-rules/ # Custom detection rules ├── 03-attack-simulations/ # Dokumentasi setiap serangan ├── 04-detection-evidence/ # Screenshot bukti deteksi ├── 05-suricata/ # Konfigurasi Suricata IDS ├── 06-incident-response/ # Active Response dan IR Report └── docs/ # Dokumentasi tambahan \`\`\` ## MITRE ATT&CK Coverage - T1190 — Exploit Public-Facing Application - T1059 — Command and Scripting Interpreter - T1505.003 — Web Shell - T1110 — Brute Force - T1046 — Network Service Scanning - T1499 — Endpoint Denial of Service
标签:AMSI绕过, BurpSuite集成, CISA项目, Cloudflare, DDoS, DNS 解析, DVWA, Metaprompt, MITRE ATT&CK, Nmap侦察, PE 加载器, PoC, Suricata, T1059, T1190, Wazuh, Webshell, XSS, 反向Shell, 命令注入, 威胁检测, 安全运营中心, 家庭实验室, 攻击模拟, 暴力破解, 漏洞情报, 漏洞演练, 现代安全运营, 网络信息收集, 网络安全, 网络映射, 速率限制, 防御绕过, 隐私保护, 驱动签名利用