Welcome to this new post on our home laboratory, which is gradually growing more and more.
In this article we will create a testing machine to play without fear, and we will deal with the necessary configurations to log everything that happens in it.
In the second post we talked about the existing event repositories, more specifically about the Mordor project and the EVTX-ATTACK-SAMPLES repository.
These repositories are very useful for understanding and learning about how many threats behave, and they make the work much easier, but when the work is already done you don’t learn as much. With your own machine we can try out new techniques and see how they are detected in the laboratory.
It is important to bear in mind that it will not be a virtual machine in which malware will be executed, as the level of isolation will not be sufficient to guarantee the security of the host computer.
[Read more…]