Post

Homelab Setup

Starting a Homelab for Learning and Experimentation

Motivation

Last Thursday, Oct 10, I spoke with my school’s cybersecurity club about my desire to get a job in the industry. I received the usual advice, with an extra emphasis on continuing to learn. This stood out to me, though. Someone said, “Not many newly grads can say they know what a pass the hash attack looks like on the logs, or how to tell if an actor is using mimikatz or evil winrm.” A second person chimed in with, “Even if they do know, they often don’t know how to stop it.”

I’m going to learn how to spot a pass-the-hash attack in logs.

Execution and Planning

So far, I have successfully:

  • Installed a Windows Server VM and a Windows Pro VM to my hypervisor
  • Set the Windows Server as a domain controller
  • Joined the Windows Pro to the domain
  • Added DHCP, DNS, and RRAS services to the Server

The client VM originally had trouble with connecting outside the local network, but I found that the problem was in the configuration of the network adapters on the Server VM. I had set up two bridged adapters, thinking I might need the second adapter for connecting to other devices on my local network, but this led to ambiguity in routing. When I realized the cause of the routing trouble, it immediately became apparent how I had overthought the routing needs of the Server VM.

Still to do:

  • Install a SIEM for the sake of data gathering and future projects
  • Actually do the PtH attack from a third machine
    • This will need to be on the same “network” in the hypervisor, and I know it can either be a Debian-based system or a Windows system.
    • For the first test, I’ll assume I have stolen credentials for one user and will use Mimikatz to get another hash and use that for lateral movement
    • That will be a “successful” attack
  • Observe the logs in Windows Event Manager and Kibana and note how it might differ from a legitimate login
This post is licensed under CC BY 4.0 by the author.