Building a Reliable Blue Team + Cloud Security Lab Across Legacy Hardware, Modern Windows, and WSL2

Summary

This project demonstrates my ability to build stable, reproducible security lab environments under tight constraints. It spans hardware repair, Linux optimisation, VM evaluation, and the final move to a high-performance WSL2 + Ubuntu SOC workspace.
The result is a fully portable, cloud-ready environment used for Blue Team, DFIR, and AWS security practice.


1. Reviving a 2009 Toshiba Laptop: Practical Recovery and Linux Hardening

Hardware: Toshiba Satellite L500-13W (2009), 4 GB RAM, legacy BIOS, USB 2.0
Issues: failed cooling fan, thermal throttling, slow HDD, misconfigured keyboard

Why MX Linux 23

  • Lightweight Debian base
  • Low CPU and RAM footprint
  • Ideal for legacy Blue Team tooling (nmap, Wireshark, tcpdump, Lynis, ClamAV, OpenVAS)

Work Completed

  • Replaced failed cooling system
  • Migrated HDD → SSD
  • Installed and hardened MX Linux
  • Set up essential defensive tooling

Outcome

  • Boot time under 30 seconds
  • Stable under sustained load
  • Suitable for scripting and small defensive labs
  • Strengthened core skills in Linux, hardware diagnosis, and system optimisation

2. Scaling Up: Why I Moved My Main SOC Lab to Windows 11

Legacy hardware limited advanced learning:

  • 4 GB RAM blocked packet capture + AWS experiments
  • Disk filled quickly with logs and container images
  • CPU bottlenecks broke simulations

New Desktop: i7 CPU, 16 GB RAM, SSD storage
This offered space for larger Blue Team workloads and cloud tooling.


3. Why WSL2 Replaced Virtual Machines

I tested:

VirtualBox

  • Disk resizing issues
  • Unreliable I/O
  • Too much time spent maintaining the environment

VMware Pro

  • Very large images
  • Heavy CPU/RAM demand
  • Snapshot and networking friction

WSL2 + Ubuntu 24.04 (Final Choice)

  • Lightweight and extremely fast
  • Near-native SSD performance
  • Clean Windows integration
  • Perfect for AWS CLI, IaC tools, automation, and Blue Team scripting
  • Easy snapshotting: wsl --export / wsl --import

Outcome: Most time now goes into security work, not environment maintenance.


4. Lab Architecture: Simple, Reliable, and SOC-Aligned

Purpose-Driven Tools

  • Log analysis utilities
  • Threat-hunting tools
  • Python for automation
  • AWS CLI / SDK
  • Packet capture and network scanning

Structured File System

~/lab/
    logs/
    captures/
    scripts/
    investigations/
    screenshots/
    notes/

Clean, version-friendly, GitHub-ready.

Coverage Areas

  • IAM posture analysis
  • CloudTrail investigations
  • S3 security checks
  • Packet capture and triage
  • Endpoint + network fundamentals

Portfolio-Ready Outputs

Every investigation or script becomes:

  • a GitHub repo
  • a small write-up
  • a reproducible artefact

Reflection: Why This Matters for a SOC & Cloud Role

This multi-stage lab journey strengthened my ability to:

  • Diagnose and repair failing systems
  • Optimise OS performance under severe constraints
  • Build stable, reproducible environments
  • Work with cross-platform tools (Linux, Windows, cloud)
  • Think like an engineer: test, refine, eliminate friction
  • Produce verifiable artefacts for employers

Today, my WSL2 lab enables consistent practice in Blue Team operations, Python automation, and AWS security — all aligned with remote SOC and cloud-security roles across the UK and EU.