Jiubel’s Home SOC Lab (Wazuh + Cowrie Honeypot)

Overview

This project focuses on building a home SOC lab to simulate attacker activity and observe how it is captured, ingested, and analyzed within a SIEM. It demonstrates the basic workflow of attack simulation, log collection, alerting, and investigation.

Tools Used

Lab Setup

The lab was built using Oracle VM VirtualBox with multiple virtual machines to simulate a basic SOC environment. Wazuh was configured as the central SIEM for log collection and analysis, while Cowrie was deployed as an SSH honeypot to capture and monitor attacker activity.

What I Did

Implementation

1. Virtual Lab Setup

Created virtual machines in Oracle VM VirtualBox to build the SOC environment.

VirtualBox Setup

2. Wazuh Installation

Installed Wazuh using the official script and confirmed it was working through the dashboard.

Wazuh Installation

Wazuh Dashboard

3. Failed Login Simulation

Generated failed authentication attempts using the su wazuh command to simulate suspicious login behavior.

Failed Login Attempts

4. Detection in Wazuh

Observed that Wazuh detected the failed login attempts and generated alerts related to authentication failures.

Wazuh Detection

5. Cowrie Honeypot Setup

Configured and started the Cowrie SSH honeypot to capture attacker interactions.

Cowrie Startup

6. SSH Attack Simulation

Connected to the honeypot via SSH and executed commands to simulate attacker behavior.

Commands used:

SSH Attack

7. Wazuh Monitoring Honeypot Activity

Verified that Wazuh detected honeypot activity including login sessions and command execution.

Wazuh Cowrie Detection

Results

Skills Demonstrated

View the GitHub Repository