Building SOC analyst Home Lab

This post explain about how to generate malicious traffic and then detect it through LimaCharlie

CYBERSECURITY

9/18/20231 min read

Section 1: Planning SOC Analyst Home Lab

First and foremost steps is to download the and set up Virtual Machine for which I refer blog post by Eric’s Substack. Follow up this link https://blog.ecapuano.com/p/so-you-want-to-be-a-soc-analyst-part to download and set up VM's.


Below is the roadmap for attacking window machine and detecting it through Limacharlie.

  • Downloading sliver (Command and control tool) on Ubuntu.

  • Generating a C2 payload

  • Downloading the C2 payload in window VM

  • Established a C2 sessions

  • Process detected in lima Charlie