Post

SOC Automation Project - Part 1

Building a SOC automation Home Lab: Part 1 - Overview

A step-by-step guide for building your very own SOC Automation Home Lab using VMWare and DigitalOcean cloud provider

In this project, we will delve into the setup and automation of our Secure Operations Center (SOC).

The project is structured into several modules, with each module focusing on a distinct component of the lab. Should any changes occur in the future, a note will be added at the beginning of the relevant module to highlight the updates.

This build is largely inspired by the MyDFIR Home Lab project and the primary aim is to gain practical experience with a variety of tools used in a SOC environment.

Overview

Components

  • Windows 10 Host (hosted in VMware)

  • Wazuh server (hosted in DigitalOcean cloud)

  • TheHive server (hosted in DigitalOcean cloud)

  • SOC Analyst email (squarex)

In this build, we will be utilizing DigitalOcean cloud servers and VMware. However, you are free to use any other cloud server or hypervisor that you prefer (you can even host everything locally if you have the necessary resources)

Diagram

Objective

In this project, we will leverage the comprehensive SIEM and XDR capabilities of Wazuh. Specifically, we will generate telemetry from our Wazuh agent related to mimikatz.exe, which will trigger an alert based on a custom rule we created. Furthermore, we will utilize Shuffle SOAR automation features to enhance our incident response. This includes enriching Indicators of Compromise (IOCs) using the VirusTotal API, creating alerts in theHive, and notifying the SOC analyst via email with detailed information about the alert.

Next Steps

In the next module, we will cover the installation and configuration of our Windows 10 host. Additionally, we will install Sysmon on our virtual machine (VM) host.

This post is licensed under CC BY 4.0 by the author.