<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://rae-sec.github.io/</id><title>rae-sec</title><subtitle>I will post my findings here.</subtitle> <updated>2026-03-15T04:05:47+00:00</updated> <author> <name>rae-sec</name> <uri>https://rae-sec.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://rae-sec.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://rae-sec.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 rae-sec </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Building a Home SOC Lab and Detecting an SSH Brute-Force Attack Part 1</title><link href="https://rae-sec.github.io/posts/home-soc-lab-wazuh-bruteforce/" rel="alternate" type="text/html" title="Building a Home SOC Lab and Detecting an SSH Brute-Force Attack Part 1" /><published>2026-03-15T00:00:00+00:00</published> <updated>2026-03-15T00:00:00+00:00</updated> <id>https://rae-sec.github.io/posts/home-soc-lab-wazuh-bruteforce/</id> <content type="text/html" src="https://rae-sec.github.io/posts/home-soc-lab-wazuh-bruteforce/" /> <author> <name>rae-sec</name> </author> <category term="cybersecurity" /> <summary>Building a Home SOC Lab with Wazuh and Detecting an SSH Brute-Force Attack Everything we’ve done prior has built up to this point where we can (properly!) practice in a SOC environment, while most want to focus on the installation process, I want to mainly focus on the methodology and how to properly simulate an attack chain from the perspective of the attacker side, and the effects of said at...</summary> </entry> <entry><title>Building a Home SOC Lab and Detecting an SSH Brute-Force Attack Part 2</title><link href="https://rae-sec.github.io/posts/home-soc-lab-wazuh-bruteforce-2/" rel="alternate" type="text/html" title="Building a Home SOC Lab and Detecting an SSH Brute-Force Attack Part 2" /><published>2026-03-15T00:00:00+00:00</published> <updated>2026-03-15T03:35:08+00:00</updated> <id>https://rae-sec.github.io/posts/home-soc-lab-wazuh-bruteforce-2/</id> <content type="text/html" src="https://rae-sec.github.io/posts/home-soc-lab-wazuh-bruteforce-2/" /> <author> <name>rae-sec</name> </author> <category term="cybersecurity" /> <summary>Detection in the Wazuh Dashboard Within seconds of launching the brute-force attack, multiple alerts appeared in the Wazuh dashboard. The platform identified repeated authentication failures originating from the same source IP address. These alerts were triggered by Wazuh rules designed to detect suspicious login behavior. Each alert provided valuable contextual information, including: ...</summary> </entry> <entry><title>Pfsense Firewall and Networking setup</title><link href="https://rae-sec.github.io/posts/pfsense-firewall-and-networking-setup/" rel="alternate" type="text/html" title="Pfsense Firewall and Networking setup" /><published>2025-09-04T12:53:00+00:00</published> <updated>2026-03-10T19:46:38+00:00</updated> <id>https://rae-sec.github.io/posts/pfsense-firewall-and-networking-setup/</id> <content type="text/html" src="https://rae-sec.github.io/posts/pfsense-firewall-and-networking-setup/" /> <author> <name>rae-sec</name> </author> <summary>When building a home cybersecurity lab, one of the most important goals is ensuring that potentially dangerous testing activities remain isolated from the rest of the network. To achieve this, I deployed pfSense as a virtual firewall inside my Proxmox Virtual Environment. This setup allows me to simulate a realistic enterprise-style network architecture while safely separating my internal lab e...</summary> </entry> <entry><title>Building My Proxmox Homelab</title><link href="https://rae-sec.github.io/posts/building-my-proxmox-homelab/" rel="alternate" type="text/html" title="Building My Proxmox Homelab" /><published>2025-09-04T09:30:00+00:00</published> <updated>2025-09-04T13:27:40+00:00</updated> <id>https://rae-sec.github.io/posts/building-my-proxmox-homelab/</id> <content type="text/html" src="https://rae-sec.github.io/posts/building-my-proxmox-homelab/" /> <author> <name>rae-sec</name> </author> <category term="homelab" /> <category term="virtualization" /> <summary>Ever since I’ve graduated, I needed a way to apply all my theory into practice in safe environments under legal conditions and without harming others. So I’ve went ahead and installed Proxmox on an old computer of mine to virtualize multiple devices and experiment with some of the tools that I’ll eventually be using in my professional career within the comforts of my home office. Hardware Over...</summary> </entry> <entry><title>Hello World</title><link href="https://rae-sec.github.io/posts/hello-world/" rel="alternate" type="text/html" title="Hello World" /><published>2025-09-04T09:00:00+00:00</published> <updated>2025-09-04T12:36:55+00:00</updated> <id>https://rae-sec.github.io/posts/hello-world/</id> <content type="text/html" src="https://rae-sec.github.io/posts/hello-world/" /> <author> <name>rae-sec</name> </author> <category term="blog" /> <category term="introduction" /> <summary>Hello and welcome! This is my little corner of the web where I share what I’m exploring in cybersecurity, homelabs, and penetration testing. I built the site using Jekyll and host it on GitHub Pages, so it’s fast, simple, and easy for me to update whenever I have something new to share. Here, you’ll find tutorials, lab experiments, and insights from my journey into different sides of tech and...</summary> </entry> </feed>
