<aside> 🔖
</aside>
Project Title: Designing a Full-Stack SOC Lab with Splunk | Building Detection, Alerting and Investigation Workflows Against Simulated Attacks.
Platform: On-Premises Hyper-V Lab Environment
Project Scope: Full end-to-end detection pipeline using Windows, Linux, and Splunk
Author: Athanasios Oikonomopoulos / B4ckD00rR4t
This project was developed to simulate a complete SOC environment, integrating detection engineering, alerting, and analyst triage. The lab was fully self-hosted using Hyper-V, and consisted of four virtual machines: a Splunk SIEM server (Ubuntu), a Windows 10 victim, a Kali Linux attacker, and a SOC Analyst workstation.
Throughout the project, I:
/customer-data-dump.html
) to simulate attacker reconnaissance and log triggeringcurl
, wget
, and nmap
to validate detection logicEvery phase, from infrastructure to alert validation, was documented step-by-step, highlighting key decisions, configurations, and lessons learned during the build.
This project demonstrates my ability to construct a functioning SOC pipeline from scratch, integrate log sources, write SPL for triage, simulate threats, and operationalize detection logic in a hands-on, blue team setting. The skills practiced here are directly applicable to roles in detection engineering, SOC analysis, and security monitoring.
Whether you're a fellow student, blue teamer, or security professional reviewing this as part of my portfolio, I invite you to explore my approach and methodology. It reflects my technical capabilities, investigative mindset, and dedication to mastering practical, real-world cybersecurity operations.