Post

Proxmox-Based Cybersecurity Lab - Active Directory, Monitoring & Malware Analysis

Proxmox-Based Cybersecurity Lab - Active Directory, Monitoring & Malware Analysis

Most cybersecurity labs focus on isolated machines and basic exploitation. This lab was designed to simulate a structured internal environment with segmentation, monitoring, and controlled attack paths, closer to how real enterprise systems operate.

The goal was to move beyond standalone attack setups and build a system that reflects both attacker and defender perspectives, emphasizing how infrastructure is designed, monitored, and secured.

Overview

The lab consists of:

  • Proxmox VE as the hypervisor
  • Segmented internal networks for isolation
  • Active Directory environment
  • Monitoring stack (Wazuh + Suricata + Sysmon)
  • Dedicated attacker VM (Kali)
  • Isolated malware analysis environment (MAL01 + REMnux)

This architecture mirrors real environments where production systems, monitoring infrastructure, and high-risk analysis zones are strictly separated.

Proxmox Server

Architecture Diagram

Cyber Lab Architecture

1. Lab Architecture Design

The lab is segmented into three isolated zones:

Victim Network (vmbr2)

  • Subnet: 172.16.10.0/24
  • Simulates an internal enterprise environment

Systems:

  • DC01 (Domain Controller)
  • WS01, WS02 (Workstations)
  • WEB01 (Linux web server)
  • KALI (Attacker VM)

Monitoring Network (vmbr3)

  • Subnet: 172.16.20.0/24

System:

  • MON01 (Monitoring server)

MON01 uses dual interfaces:

  • vmbr3 → monitoring network
  • vmbr2 → direct visibility into victim traffic

Malware Network (vmbr4)

  • Subnet: 10.50.50.0/24

Systems:

  • MAL01 (Windows detonation VM)
  • REM01 (REMnux analysis VM)

This segmentation ensures controlled experimentation while reflecting real-world isolation between production, monitoring, and high-risk environments.

2. Proxmox Network Segmentation

Dedicated Linux bridges were created:

  • vmbr2 → victim network
  • vmbr3 → monitoring network
  • vmbr4 → malware network

Key design decision:

  • No physical NIC attached
  • No gateway configured

This ensures complete isolation from external networks, preventing accidental exposure.

3. Building the Domain Controller (DC01)

A Windows Server 2019 VM was configured as the domain controller.

Roles:

  • Active Directory Domain Services
  • DNS
  • Authentication

Configuration:

  • Domain: corp.local
  • IP: 172.16.10.10

A snapshot was taken after setup to preserve a clean baseline.

4. Configuring Active Directory Environment

To simulate a realistic enterprise:

Organizational Units

  • Servers
  • Workstations
  • Users
  • ServiceAccounts
  • Groups

Users

  • alice
  • bob
  • charlie
  • david

Service Accounts

  • svc_sql
  • svc_backup

Admin

  • itadmin (Domain Admins)

This structure enables realistic identity and privilege-based attack scenarios.

Active Directory Structure

5. Creating Domain Workstations

Two Windows 10 systems:

  • WS01 → 172.16.10.20
  • WS02 → 172.16.10.21

Configured with:

  • Static IPs
  • DNS pointing to DC01
  • Joined to corp.local

This enables authentication flows and lateral movement simulation.

6. Adding WEB01 (Linux Target)

An Ubuntu Server VM:

  • IP: 172.16.10.30

Purpose:

  • Web attack surface simulation
  • Hosting vulnerable applications
  • Expanding beyond Windows-only scenarios

7. Adding Kali (Attacker VM)

Kali was placed inside the victim network:

  • IP: 172.16.10.50

Benefits:

  • Internal attack simulation
  • Pivoting scenarios
  • Fully self-contained lab

8. Building the Monitoring Stack (MON01)

The core of the detection layer.

Configuration:

  • vmbr3 → 172.16.20.10
  • vmbr2 → 172.16.10.40

Tools

  • Wazuh → SIEM + dashboard
  • Sysmon → endpoint telemetry
  • Suricata → network IDS

Key Design Decisions

  • IP forwarding disabled (prevents pivoting)
  • Firewall restrictions applied
  • Monitoring-only role (no active participation)

This ensures MON01 provides visibility without becoming an attack path, maintaining monitoring without introducing additional risk.

Wazuh Dashboard

9. Malware Detonation Environment (MAL01)

A dedicated Windows analysis VM:

  • IP: 10.50.50.10
  • Network: vmbr4

Tools

  • Sysmon
  • Sysinternals Suite
  • Wireshark
  • FakeNet-NG
  • PE analysis tools
  • Debuggers

Security measures:

  • No external connectivity
  • Defender disabled (controlled testing)
  • Snapshot for rollback

10. REMnux Analysis VM

REM01 complements malware analysis:

  • IP: 10.50.50.20

Used for:

  • Network simulation
  • Static + dynamic analysis
  • Traffic inspection

REMnux Fakenet

FakeNet-NG simulates internet services, allowing safe observation of malware network behavior without real external communication.

Final Lab Layout

Victim Network

  • DC01 → 172.16.10.10
  • WS01 → 172.16.10.20
  • WS02 → 172.16.10.21
  • WEB01 → 172.16.10.30
  • MON01 → 172.16.10.40
  • KALI → 172.16.10.50

Monitoring Network

  • MON01 → 172.16.20.10

Malware Network

  • MAL01 → 10.50.50.10
  • REM01 → 10.50.50.20

What This Lab Enables

  • Active Directory attack simulation
  • Lateral movement analysis
  • SIEM-based detection workflows
  • Endpoint telemetry analysis
  • Network traffic inspection
  • Safe malware detonation
  • End-to-end attacker-to-defender visibility

What Makes This Lab Different

  • Designed with segmentation from the beginning instead of a flat network
  • Includes both offensive (Kali) and defensive (Wazuh, Suricata, Sysmon) components
  • Dedicated malware analysis zone instead of mixing environments
  • Focused on visibility and detection, not just exploitation

The environment enables safe experimentation across the full attack lifecycle, from initial access to detection and analysis.

Key Takeaways

  • Segmentation matters more than scale
  • Visibility is more valuable than adding targets
  • Snapshots enable safe experimentation
  • Realism comes from architecture, not complexity
  • Security requires understanding both attacker and defender

Conclusion

This lab evolved from a simple setup into a structured environment that reflects real-world architecture.

The key takeaway is not just deploying systems, but understanding how they interact, how they are monitored, and how they can be safely tested.

This foundation can now be extended into detection engineering, advanced attack simulations, and incident response workflows.

This post is licensed under CC BY 4.0 by the author.