Logo Home Lab Hacker
  • Home
  • Recent Posts
  • Projects
  • About
  • Skills
  • More
    Job Experience Education
  • Posts
  • English
    English Español
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Posts
  • Introduction
  • Threat Intelligence
    • Threat Intel Setup Part 1
    • Threat Intel Setup Part 2
    • Threat Intel Setup Part 3
Hero Image
Threat Intel Setup Part 3 (Grafana)

We’ve reached the culmination of our Threat Intel series for now… Throughout this journey, we’ve set up various systems—PFSense, Graylog, and now Grafana—to recreate a robust environment similiar to a Security Operations Center (SOC) right in your own home lab using open sourced software. Our ultimate goal is to build an ecosystem where you can seamlessly analyze network traffic and visualize data from ingested logs as we look to deploy more services in our lab.

  • Grafana
  • Multi-lingual
Thursday, February 6, 2025 | 3 minutes Read
Hero Image
Threat Intel Setup Part 2 (Graylog)

Welcome back to the Threat Intel series! In this chapter, we’re rolling up our sleeves and diving deeper into Graylog’s powerful features to optimize the way it handles and enriches log data from PFSense and Suricata. If you’re ready to transform raw log messages into actionable insights, this guide is for you! What’s on the Agenda? We’ll configure essential Graylog settings to streamline parsing incoming log messages. By the end of this deep dive, you’ll have a setup capable of:

  • Graylog
  • Multi-lingual
Thursday, February 6, 2025 | 6 minutes Read
Hero Image
Threat Intel Setup Part 1 (Graylog & PFSense)

In the ever-evolving landscape of cybersecurity, knowing what’s happening inside your network is crucial. Imagine being able to gain real-time insights into every action—what’s allowed, what’s blocked, and who’s trying to sneak in. This guide takes you through the process of setting up a powerful threat intelligence solution by pushing logs from pfSense (an open-source firewall) into Graylog (an open-source log aggregator and parser). By the end of this project, you’ll have not only a functional setup but also a deeper understanding of your network’s security posture. Think of it as a detective tool that helps you monitor, analyze, and respond to network threats more effectively—all while learning and having fun! Dive into the world of threat intelligence and take control of your network’s security today.

  • Graylog
  • PFSense
  • Multi-lingual
Thursday, February 6, 2025 | 6 minutes Read
Hero Image
Introduction

About Me Welcome to Home Lab Hacker! I’m Carlos Marquez, a cybersecurity professional with a passion for innovation, learning, and sharing knowledge. Over the years, I’ve honed my skills in penetration testing, cloud security, and infrastructure management. Through this platform, I aim to share my journey of exploring home lab curiosities, from deploying innovative tools and software to implementing cyber deception techniques that provide real-time insights into threat actors in the wild.

  • Bio
  • Multi-lingual
Thursday, February 6, 2025 | 3 minutes Read
Navigation
  • Recent Posts
  • Projects
  • About
  • Skills
  • Job Experience
  • Education
Contact me:
  • gnarly-cl0s
  • Carlos Marquez
  • DonCarlito23

Toha Theme Logo Toha
© 2025 Copyright.
Powered by Hugo Logo