The lab runs on a VMware-based hypervisor with dedicated VMs for each function:
/etc, /var/log, auth files)Nmap full-port scans, Hydra SSH brute-force, Metasploit exploit/multi/handler sessions, manual SUID exploitation on the misconfigured VM, and Kali’s evil-winrm connectivity tests. Each simulation produced Wazuh alerts that were triaged, documented, and used to refine detection rules.
The lab is an ongoing project — rule tuning and new attack modules added continuously as study for Security+ and VCP-DCV scenarios.