Proxmox Cybersecurity Home Lab

Turning legacy hardware into a flexible cybersecurity testing environment.

## โš™๏ธ What It Is This is my custom-built **cybersecurity home lab**, running on an old 2008 Mac Pro repurposed as a **Proxmox Virtual Environment (VE)** host. It serves as the foundation for testing: - Blue team detection workflows - Security platforms like **Security Onion**, **Suricata**, **Zeek** - Network segmentation and monitoring - Log collection, triage, and alerting --- ## ๐Ÿงฑ Hardware Overview - ๐Ÿ–ฅ๏ธ **Mac Pro 2008 (Model A1186)** โ€“ Xeon 2.8 GHz - ๐Ÿ” Upgraded RAM from a second donor machine - ๐Ÿ’พ 120GB SSD (Proxmox boot) + 1TB and 2TB HDDs for storage - ๐Ÿ›  One bent bay was manually realigned to mount drives correctly I chose to work within the limits of aging hardware to simulate a realistic, resource-constrained blue team setup. --- ## ๐Ÿ› ๏ธ Stack + Features - **Proxmox VE** โ€“ base hypervisor for all virtualized services - **Security Onion** โ€“ full packet capture, Suricata + Zeek + Wazuh stack - **Ubuntu Server** โ€“ for DNS (Unbound), Pi-hole, and file services - **Kali Linux** โ€“ attacker-side tools for testing detection logic - **Syslog Forwarding** โ€“ all logs route to Security Onion for analysis --- ## ๐Ÿ“ฆ Active Use Cases - Building a **detection pipeline** from scratch - Practicing **packet capture review** and log correlation - Running mock attacks to tune alerts - Managing VM sprawl and network segmentation in a live SOC-style config --- ## ๐Ÿšง Challenges Faced - Mac EFI boot quirks with Proxmox ISO - Thermal management (FB-DIMMs run hot) - SATA port damage required bay swap and realignment - Drive mounting inconsistencies (legacy chassis weirdness) --- ## ๐Ÿ”„ Roadmap - ๐Ÿง  Inject attack traffic with Atomic Red Team or Caldera - ๐Ÿ“Š Integrate Grafana or Kibana for better visualizations - ๐Ÿ›ฐ Deploy endpoint agents (Velociraptor