Index of my study infrastructure.
- VS Code IDE: VSCode setup for C, Python and SQLite development, extending CS50's workflow.
- Tails Amnesic Incognito System: Personal setup and operational notes for an amnesic security environment on a USB drive.
- pfSense: Default gateway for the virtual lab network, handling routing and firewall rules.
- SOC Lab: Security Operations Center lab for hands-on practice with SIEM, log analysis, threat detection, and incident response workflows.
- Kali Linux: Analyst virtual machine for security analysis of the homelab environment and CTF challenges on online study platforms.
Vulnerable Systems:
- Metasploitable: Intentionally vulnerable virtual machines for penetration testing practice and security training across multiple versions.
Web Applications:
- DVWA (Damn Vulnerable Web Application) — In documentation process.
Completed:
- Host Machine: VS Code IDE + Oracle VirtualBox;
- Tails Amnesic Incognito System (Bootable USB);
- pfSense VM (Firewall/Router);
- Kali Linux VM (Security Analysis);
- Metasploitable VMs (versions 1 and 2);
- Debian + DVWA;
- SOC Lab (in progress);
Web Applications:
- OWASP Juice Shop;
- DVWA (Damn Vulnerable Web Application);
Vulnerable Systems:
- Metasploitable3-ub1404 (Ubuntu);
- Metasploitable3-win2k8 (Windows);
Active Directory Lab:
- Windows Server 2025 + Active Directory;
Workstations:
- Windows 11 (Production);
- Windows 10;
Legacy Systems (EOL):
- Windows 7;
- Windows Vista;
- Windows XP;
Malware Analysis (Isolated):
- Windows 11 - Malware Analysis Lab (Snapshot)
- Tools: Wireshark, IDA, x32dbg, x64dbg, ProcMon, ProcExp, Ghidra, DIE, HxD
- Debian VM:
- Snapshot: OWASP Juice Shop
- Snapshot: DVWA
Common issues and their solutions.
- Problem: Corrupted/duplicated USB drivers after reinstall or update.
- Solution: Reinstall VirtualBox cleanly:
- Uninstall VirtualBox (accept removal of all network/USB components);
- Delete
C:\Program Files\Oracle\VirtualBoxandC:\Windows\System32\drivers\VBox*; - Reboot;
- Reinstall from virtualbox.org.
