paul78 wrote: » Try this:https://securityonion.net/https://www.youtube.com/channel/UCNBFTyYCdjT5hnm7uW25vGQ/videoshttps://www.youtube.com/results?search_query=security+onion
cyberguypr wrote: » I have to put here what I told you via PM for the benefit of others. Tust me, you don't want anyone to do this for you. The greatest value for you IS that hair pulling. Sure someone can do it and then you look at the results, but deploying this and banging your head against a wall will be the best experience you can get. You know what they say: no pain, no gain.
Kapital wrote: » I need to get more hands on experience of IPS/IDS, FIREWALLS, SIEM etc. and was wondering should I choose option 1 or 2. 1. Set up home lab on old but powerful PC with Virtualbox, SNORT, SURICATA, pfsense and Splunk. 2. Try to find a similar configuration available commercially (cloud?) which will help me come upto speed without hassles. Those of you who have tried similar setups, what would you recommend? Which path will be least painless and quicker to get me more exposure?
paul78 wrote: » I will second that statement.@Kapital - if your intent is to learn the technology - there is no substitute for doing it yourself. And when you are stuck - that's a good time to ask the question.
airzero wrote: » I just bought an old HP proliant from Ebay (savemyserver.com has some great deals) and set up an small active directory environment on it. Once the domain was up and running, I added in a security onion server and throw a few sensors in the network for monitoring. Now I run through red teaming type scenarios using Kali linux and other tools (Powershell Empire, Cobalt Stike, etc.) to practice my pentesting skills, then go back and look through the alerts from snort and logs in the ELK stack. Great experience for learning more about windows, firewalls, routing, etc. as well as offensive/defensive practice. All it cost me was $200 and a bunch of time. Edit: The server may be a bit big and loud as a home lab, but I compensate by only having it turned on only when I'm using it so it's really not that bad.