Server Preparation
Confirm server specifications, back up any needed data, and prepare the machine to become a dedicated hypervisor host.
This project documents the buildout of my dedicated cybersecurity home lab hosted on a personal server. The lab is being built to practice virtualization, network isolation, Windows and Linux administration, traffic analysis, logging, and hands-on cybersecurity fundamentals in a safe, isolated environment.
I created this home lab to build hands-on experience in cybersecurity and IT using a dedicated server-based environment. The goal is to create a realistic practice space where I can work with Windows and Linux systems, network traffic analysis, system hardening, logging, and foundational security workflows.
This lab also serves as a long-term project that supports my technical portfolio. It will connect multiple lab exercises into one environment and document both the build process and the skills developed along the way.
This section will be updated with the final server specifications once the hardware details are confirmed.
The lab will be built around a dedicated Proxmox host with multiple virtual machines connected through an isolated lab network. The environment is designed to support safe testing, system administration practice, traffic analysis, and future security-focused expansions.
These are the planned core virtual machines for the first version of the lab.
| VM Name | Operating System | Purpose | Resources | Status |
|---|---|---|---|---|
| LAB-UBUNTU-SRV-01 | Ubuntu Server | Linux administration, SSH, services, logging, and firewall practice | 2 vCPU / 16 GB RAM / 25 GB disk | Planned |
| LAB-KALI-01 | Kali Linux | Enumeration, packet capture, and security analysis workstation | 2 vCPU / 16 GB RAM / 80 GB disk | Planned |
| LAB-WIN11-CLIENT-01 | Windows 11 | Event Viewer, Defender, PowerShell, firewall rules, and endpoint practice | 2 vCPU / 16 GB RAM / 96 GB disk | Planned |
| LAB-METASPLOITABLE2-01 | Metasploitable 2 | Intentionally vulnerable target for controlled internal-lab testing | 1 vCPU / 1 GB RAM / 20 GB disk | Future Add |
This section tracks the major phases of the home lab build.
Confirm server specifications, back up any needed data, and prepare the machine to become a dedicated hypervisor host.
Install Proxmox VE, configure management access, and prepare the environment for virtualization and isolated networking.
Build an isolated lab network for VM-to-VM traffic and keep vulnerable systems separated from the main home network.
Create Ubuntu Server, Kali Linux, and Windows 11 virtual machines and verify connectivity and basic functionality.
Test connectivity, SSH access, Windows administration tools, basic scanning, and packet capture in the isolated environment.
Add vulnerable targets, logging improvements, and additional systems such as Active Directory, centralized logs, or a SIEM.
This home lab is designed to support multiple hands-on exercises and technical writeups over time.
Screenshot placeholders for this project will include the Proxmox dashboard, VM list, network configuration, VM consoles, packet captures, and operating system configuration screens.
This section will be updated throughout the build to reflect what I learn about virtualization, networking, system configuration, and troubleshooting while expanding the lab.
As the project develops, this section will link to the main GitHub repository, related labs, and documentation pages connected to the home lab.