A journey through cybersecurity research, infrastructure deployment, and hands-on learning in OT/ICS security, Active Directory, and threat intelligence.
Complete self-hosted infrastructure running on Proxmox and Raspberry Pi, demonstrating practical deployment and management of production-grade security systems.
Key Learning: Hands-on experience deploying and managing production-grade infrastructure, including virtualization (Proxmox), containerization (Docker), reverse proxies (Nginx), SSL/TLS certificates (Let's Encrypt), dynamic DNS, and port forwarding for public accessibility.
Core technologies mastered through building and deploying this security research platform.
Multi-protocol honeypot system designed to detect and analyze threats targeting industrial control systems and enterprise infrastructure.
Learning Focus: Deployed and configured multiple honeypot technologies, integrated with ELK stack for centralized logging, configured port forwarding and firewall rules, and developed custom parsers for protocol-specific data extraction.
All honeypot data flows through a centralized ELK stack for real-time analysis:
Custom-built Active Directory attack path analysis platform with multi-engagement support, 42 preset queries, and secure HTTPS upload capabilities.
engagement_id properties7 categories: Users, Computers, Groups, Permissions, Kerberos, Domain Trusts, Attack Paths
Execute custom Neo4j queries for advanced analysis
Secure BloodHound ZIP upload from anywhere
Complete data isolation between assessments
Find paths between any two AD entities
Full support for all BloodHound relationships
Technical Achievement: Built a production-ready BloodHound platform from scratch, including custom upload handler with ZIP parsing, engagement isolation logic, 42 Cypher queries across 7 categories, Docker containerization, Nginx reverse proxy configuration, Let's Encrypt SSL automation, and CORS-enabled API for cross-origin access.
Complete implementation of all BloodHound relationship types:
A chronological view of skills and technologies mastered through hands-on implementation of this security research platform.
Proxmox & Virtualization
Cowrie, Conpot & ICS Protocols
ELK Stack Integration
Frontend & API Integration
Graph Database & Active Directory Analysis
Nginx, SSL/TLS & Network Configuration
Python, Flask & Email Integration
Docker, CI/CD & Service Management
MITRE ATT&CK, IEC 62443 & Threat Intelligence
Key Takeaway: This project represents a comprehensive journey from basic infrastructure setup to advanced security research, demonstrating practical skills in virtualization, containerization, web development, API design, database management, networking, security operations, and threat intelligenceβall deployed and managed on self-hosted infrastructure.