<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[HastyTurn]]></title><description><![CDATA[HastyTurn]]></description><link>https://blog.hastylabs.com</link><generator>RSS for Node</generator><lastBuildDate>Wed, 08 Apr 2026 03:30:37 GMT</lastBuildDate><atom:link href="https://blog.hastylabs.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[SIEM installation]]></title><description><![CDATA[Today’s focus was expanding the home lab by deploying Wazuh SIEM on a second laptop. To keep things flexible, I opted for a Docker container deployment. Since this is a testing phase, I’m not overly concerned about potential issues; I plan to have a ...]]></description><link>https://blog.hastylabs.com/siem-installation</link><guid isPermaLink="true">https://blog.hastylabs.com/siem-installation</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[Homelab]]></category><category><![CDATA[Raspberry Pi]]></category><category><![CDATA[wazuh]]></category><category><![CDATA[SIEM]]></category><category><![CDATA[student]]></category><category><![CDATA[Job Hunting]]></category><category><![CDATA[Docker]]></category><dc:creator><![CDATA[Lee Jones]]></dc:creator><pubDate>Fri, 06 Feb 2026 04:28:01 GMT</pubDate><content:encoded><![CDATA[<hr />
<p>Today’s focus was expanding the home lab by deploying <strong>Wazuh SIEM</strong> on a second laptop. To keep things flexible, I opted for a <strong>Docker container</strong> deployment. Since this is a testing phase, I’m not overly concerned about potential issues; I plan to have a more permanent, dedicated system in place by the time the lab goes "production."</p>
<p>For now, the Dockerized Wazuh will be a "start-and-stop" process. This allows me to keep the laptop available for lab expansions while still having enough resources to stay on top of my university coursework.</p>
<h3 id="heading-the-hurdles-passwords-and-architectures">The Hurdles: Passwords and Architectures</h3>
<p>The first major struggle today was a stubborn authentication issue. For some reason, Wazuh refused to let me change the default <strong>admin password</strong>. From a security standpoint, leaving default credentials active is a massive red flag, so I spent a good chunk of time troubleshooting until it finally took.</p>
<p>Next came the agent deployment. A small but critical detail the Wazuh dashboard doesn't explicitly highlight is the architecture difference for certain devices. When deploying to my Raspberry Pi, the default "AMD64" code failed. I had to manually swap <code>amd64</code> to <code>arm64</code> in the installation string. Once that simple edit was made, the agent connected instantly without further issues.</p>
<h3 id="heading-the-long-road-ahead-vulnerability-triage">The Long Road Ahead: Vulnerability Triage</h3>
<p>The biggest task—and likely the most time-consuming—is tackling the mountain of vulnerabilities Wazuh just handed me:</p>
<ul>
<li><p><strong>40 Critical/High</strong></p>
</li>
<li><p><strong>72 Medium</strong></p>
</li>
<li><p><strong>4 Low</strong></p>
</li>
</ul>
<p>It’s an intimidating list at first glance, but a quick deep-dive reveals some interesting context. Looking at the first few "High" alerts, I found that <strong>Debian</strong> (the OS on my Pi) has actually marked some of these as <strong>"&lt;ignored&gt;"</strong>.</p>
<p>In many cases, the security team deems the risk "Minor" or "Local only," meaning a user would have to manually run a very specific, obscure command for the vulnerability to even be a threat. It’s a good reminder that SIEM alerts require a human touch to separate real risks from "paper" vulnerabilities.</p>
<h3 id="heading-next-steps">Next Steps</h3>
<p>Over the next few days, I’ll be balancing three plates:</p>
<ol>
<li><p><strong>Dissertation Prep:</strong> Mapping out my initial ideas and research.</p>
</li>
<li><p><strong>Lab Hardening:</strong> Continuing to build out the environment.</p>
</li>
<li><p><strong>Vulnerability Triage:</strong> Methodically working through the Wazuh list to see what needs a patch and what is just "noise."</p>
</li>
</ol>
<hr />
]]></content:encoded></item><item><title><![CDATA[Time to setup a lab]]></title><description><![CDATA[First Steps: Building a Home Lab for Growth
As a Cybersecurity student looking at the current job market, it’s clear that junior roles are scarce for graduates. While I’m currently on track for a 1st Class degree, I’ve realized that re-reading univer...]]></description><link>https://blog.hastylabs.com/time-to-setup-a-lab</link><guid isPermaLink="true">https://blog.hastylabs.com/time-to-setup-a-lab</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[student]]></category><category><![CDATA[learning]]></category><category><![CDATA[#growth]]></category><category><![CDATA[Homelab]]></category><category><![CDATA[improvement]]></category><dc:creator><![CDATA[Lee Jones]]></dc:creator><pubDate>Thu, 05 Feb 2026 04:16:06 GMT</pubDate><content:encoded><![CDATA[<h2 id="heading-first-steps-building-a-home-lab-for-growth">First Steps: Building a Home Lab for Growth</h2>
<p>As a Cybersecurity student looking at the current job market, it’s clear that junior roles are scarce for graduates. While I’m currently on track for a <strong>1st Class degree</strong>, I’ve realized that re-reading university notes only takes you so far. To truly master different security aspects, you have to build.</p>
<p>Today, I decided to bridge that gap by building a dedicated home lab.</p>
<h3 id="heading-the-hardware">The Hardware</h3>
<p>I’m running the lab on a <strong>Raspberry Pi 5 (16GB RAM)</strong> equipped with a <strong>500GB SSD</strong> for better performance and reliability over a standard SD card.</p>
<h3 id="heading-the-stack-dockerized">The Stack (Dockerized)</h3>
<p>I chose Docker to keep my projects isolated and manageable. Here is the current lineup:</p>
<ul>
<li><p><strong>Dockge:</strong> For YAML file editing and managing <code>.env</code> files.</p>
</li>
<li><p><strong>Portainer:</strong> For container health monitoring and user authorization.</p>
</li>
<li><p><strong>HastyBot:</strong> My Discord bot (currently in development).</p>
</li>
<li><p><strong>Webgame:</strong> A side project in the making.</p>
</li>
<li><p><strong>Main Site:</strong> This will eventually host bot stats and project information.</p>
</li>
<li><p><strong>phpMyAdmin:</strong> For easy web-based database management.</p>
</li>
<li><p><strong>MariaDB:</strong> The backend database for both HastyBot and the webgame.</p>
</li>
<li><p><strong>Watchtower:</strong> To ensure my container stacks stay up to date automatically.</p>
</li>
</ul>
<h3 id="heading-whats-next">What’s Next?</h3>
<p>Building the lab is just the beginning. Next, I’ll be installing <strong>Wazuh</strong> on a separate laptop and deploying an agent to the Pi. This will allow me to dive into SIEM monitoring and endpoint security in a live environment.</p>
]]></content:encoded></item></channel></rss>