{"id":93,"date":"2023-03-12T05:35:19","date_gmt":"2023-03-12T05:35:19","guid":{"rendered":"https:\/\/yashinfosec.com\/?page_id=93"},"modified":"2024-07-17T14:14:12","modified_gmt":"2024-07-17T14:14:12","slug":"my-inventory","status":"publish","type":"page","link":"https:\/\/yashinfosec.com\/?page_id=93","title":{"rendered":"My Inventory"},"content":{"rendered":"\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:57% auto\"><figure class=\"wp-block-media-text__media\"><img data-opt-id=752057397  fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:576\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/setup-1.jpg\" alt=\"\" class=\"wp-image-288 size-full\" srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:576\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/setup-1.jpg 1024w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:169\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/setup-1.jpg 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:768\/h:432\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/setup-1.jpg 768w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1536\/h:864\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/setup-1.jpg 1536w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:900\/h:506\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/setup-1.jpg 900w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:281\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/setup-1.jpg 500w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1599\/h:899\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/setup-1.jpg 1599w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>A home lab in cybersecurity serves as a vital training ground for aspiring professionals, allowing them to hone their skills in a controlled environment. It provides hands-on experience with various tools and techniques, fostering a deeper understanding of security concepts. This practical knowledge is crucial for defending against real-world cyber threats and vulnerabilities. Additionally, a home lab offers a safe space for testing new solutions and experimenting with different configurations, contributing to developing effective defence strategies. Ultimately, a well-equipped home lab is an indispensable asset for anyone seeking a successful career in cybersecurity.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 57%\"><div class=\"wp-block-media-text__content\">\n<p>A Network Attached Storage (NAS) system is a crucial component in a home lab, serving as a centralized storage solution for data and files. It allows users to efficiently store, access, and share information across the network. In a cybersecurity home lab, NAS facilitates the secure storage of datasets, logs, and backups, ensuring easy retrieval and analysis of critical information. Furthermore, NAS devices often support RAID configurations, enhancing data redundancy and reliability. This centralized storage solution is instrumental in creating a resilient and organized infrastructure for cybersecurity enthusiasts to conduct experiments and manage resources effectively.<br><br><span style=\"text-decoration: underline;\"><strong>My Configuration:<\/strong><\/span><br>MB: AsRock B450M Motherboard<br>CPU: Ryzen 5 1600<br>RAM: Ripjaws GSkill 16GB DDR4<br>GPU: Nvidia 720 2GB<br>PS: 350 Watt<br>OS: TrueNAS Scale<br><br><strong><span style=\"text-decoration: underline;\">Storage:<\/span><\/strong><br>Primary storage: 120GB Samsung EVM SSD for OS<br>Secondary Storage: 3 x 1TB HDD<br>1 x 4TB HDD = 7TB for NAS<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img data-opt-id=650589290  fetchpriority=\"high\" decoding=\"async\" width=\"461\" height=\"1024\" src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:461\/h:1024\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/nas.jpg\" alt=\"\" class=\"wp-image-287 size-full\" srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:461\/h:1024\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/nas.jpg 461w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:135\/h:300\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/nas.jpg 135w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:486\/h:1080\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/nas.jpg 500w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:486\/h:1080\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/nas.jpg 576w\" sizes=\"(max-width: 461px) 100vw, 461px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-center\"><figure class=\"wp-block-media-text__media\"><img data-opt-id=916619860  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:461\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/servers.jpg\"  decoding=\"async\" width=\"1024\" height=\"461\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20461%22%20width%3D%221024%22%20height%3D%22461%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22461%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-289 size-full\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:461\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/servers.jpg 1024w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:135\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/servers.jpg 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:768\/h:346\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/servers.jpg 768w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:900\/h:405\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/servers.jpg 900w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:225\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/servers.jpg 500w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1280\/h:576\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/servers.jpg 1280w\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>A server, like the Dell PowerEdge R710 running VMware ESXi 6.5, plays a pivotal role in a home lab dedicated to cybersecurity. It serves as the backbone for hosting virtual machines, allowing users to simulate diverse network configurations and security scenarios. With robust hardware capabilities, including ample processing power and memory, servers facilitate the seamless operation of multiple virtual environments for testing and experimentation. Servers in a home lab enable cybersecurity enthusiasts to replicate real-world conditions, conduct hands-on exercises, and develop effective defence strategies within a controlled and secure setting.<br><br><strong><span style=\"text-decoration: underline;\">My Configuration:<\/span><\/strong><br>Dell Poweredge R710<br>OS: VMware ESXi 6.5<br>CPU: 2 x Intel(R) Xeon(R) CPU E5520<br>4 x 500GB SATA SSD in RAID 5<br>RAM: 128GB DDDR3<br>4 nic: 2 x one network and <br>           2 x DMZ network<br><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 38%\"><div class=\"wp-block-media-text__content\">\n<p>A firewall is a critical component in the realm of cybersecurity, acting as a barrier between a trusted internal network and external, potentially untrusted networks such as the Internet. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls are essential for preventing unauthorized access, protecting against cyber threats, and managing network security effectively. In a home lab, a firewall is a fundamental element for creating a secure environment, allowing users to configure and test various rules and policies that mirror real-world scenarios. It serves as a frontline defence, enhancing the overall security posture of the network and the systems within the lab.<br><br>I&#8217;m using Dell Poweredge R210 as a firewall<br><br><strong><span style=\"text-decoration: underline;\">My Configuration:<\/span><\/strong><br>OS: PFSense<br>RAM: 16GB DDR3 ECC<br>6 NIC&#8217;s WAN, IoT, Clients, Servers &amp;&amp; DMZ interfaces (VLAN)<br>Storage: 128GB SSD<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img data-opt-id=2064236758  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/R210-4.jpg\"  loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"165\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-292 size-full\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:400\/h:165\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/R210-4.jpg 400w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:124\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/R210-4.jpg 300w\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img data-opt-id=1373860745  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:461\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/rpis.jpg\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"461\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20461%22%20width%3D%221024%22%20height%3D%22461%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22461%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-293 size-full\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:461\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/rpis.jpg 1024w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:135\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/rpis.jpg 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:768\/h:346\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/rpis.jpg 768w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:900\/h:405\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/rpis.jpg 900w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:225\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/rpis.jpg 500w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1280\/h:576\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/rpis.jpg 1280w\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>The Raspberry Pi holds significant importance in cybersecurity as a versatile and cost-effective tool. Its compact size and low power consumption make it ideal for building custom security solutions and penetration testing tools. Cybersecurity enthusiasts often use Raspberry Pi for projects like network monitoring, intrusion detection systems, and VPN servers. Its open-source nature allows for customization, enabling users to develop and deploy security applications tailored to their needs. In a cybersecurity context, the Raspberry Pi serves as a valuable asset for hands-on learning, experimentation, and the creation of practical security solutions within a budget-friendly and accessible platform.<br><br>I&#8217;m Running the following services on 5 Raspberry Pis<br>1. ADGuard<br>2. Nginx Proxy Manager<br>3. TwinGate IAM<br>4. TOR Relay<br>5. Uptime Kuma<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<p>A mini PC for self Hosted GDrive alias Filecloud<br>Big Kudosssss to Networkchuck for explaining the significance of a self-host storage drive <a href=\"https:\/\/www.youtube.com\/watch?v=xBIowQ0WaR8&amp;pp=ygUWbmV0d29ya2NodWNrIGZpbGVjbG91ZA%3D%3D\" data-type=\"link\" data-id=\"https:\/\/www.youtube.com\/watch?v=xBIowQ0WaR8&amp;pp=ygUWbmV0d29ya2NodWNrIGZpbGVjbG91ZA%3D%3D\"><br><br>Click Here to watch that Video<\/a><br><strong><span style=\"text-decoration: underline;\">My Configuration<\/span>:<\/strong><br>Dell Optiplex 9020<br>CPU: Intel Core i5-5600T<br>RAM: 8GB DDR4<br><\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img data-opt-id=312954066  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:461\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/dell-optiplex.jpg\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"461\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20461%22%20width%3D%221024%22%20height%3D%22461%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22461%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-299 size-full\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:461\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/dell-optiplex.jpg 1024w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:135\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/dell-optiplex.jpg 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:768\/h:346\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/dell-optiplex.jpg 768w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:900\/h:405\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/dell-optiplex.jpg 900w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:225\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/dell-optiplex.jpg 500w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1280\/h:576\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/dell-optiplex.jpg 1280w\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img data-opt-id=213020948  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:461\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/HP-minis.jpg\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"461\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20461%22%20width%3D%221024%22%20height%3D%22461%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22461%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-301 size-full\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:461\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/HP-minis.jpg 1024w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:135\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/HP-minis.jpg 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:768\/h:346\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/HP-minis.jpg 768w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:900\/h:405\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/HP-minis.jpg 900w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:225\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/HP-minis.jpg 500w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1280\/h:576\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/HP-minis.jpg 1280w\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Wazuh is a powerful open-source security information and event management (SIEM) platform that enhances cybersecurity capabilities for organizations. It integrates features from the widely-used OSSEC project, offering log analysis, intrusion detection, vulnerability detection, and compliance management. Wazuh enables real-time monitoring of diverse IT environments, collecting and analyzing log data to detect and respond to security incidents promptly. Its flexibility and scalability make it suitable for various deployment sizes, aiding in compliance with regulatory standards. Wazuh is a valuable tool for organizations seeking robust threat detection, incident response, and overall improvement in their cybersecurity posture.<br><br>2 x HP Mini PC&#8217;s <br>1 Running Wazuh SIEM<br>2 Running Kubernetes Slave nodes<br><span style=\"text-decoration: underline;\"><strong>My Configuration:<\/strong><\/span><br>CPU: Intel Core i5 7th gen<br>RAM: 16GB DDR4<br><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<p>A managed switch is a key element in a cybersecurity home lab, providing advanced features for network control. It enhances security through VLAN segmentation, security protocols, and monitoring capabilities. In a home lab setting, the managed switch allows users to simulate real-world cybersecurity scenarios, implement security measures, and gain hands-on experience in a controlled environment. Its significance lies in providing a customizable and secure foundation for learning and experimenting with cybersecurity concepts at home.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img data-opt-id=1047347423  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:427\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/hp-v1910-24g-24.jpg\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"427\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20427%22%20width%3D%221024%22%20height%3D%22427%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22427%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-306 size-full\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:427\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/hp-v1910-24g-24.jpg 1024w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:125\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/hp-v1910-24g-24.jpg 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:768\/h:320\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/hp-v1910-24g-24.jpg 768w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1536\/h:640\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/hp-v1910-24g-24.jpg 1536w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:900\/h:375\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/hp-v1910-24g-24.jpg 900w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:208\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/hp-v1910-24g-24.jpg 500w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1600\/h:667\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/hp-v1910-24g-24.jpg 1600w\" \/><\/figure><\/div>\n\n\n\n<figure class=\"wp-block-gallery alignwide has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img data-opt-id=28871022  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:461\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/cables.jpg\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"461\" data-id=\"308\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20461%22%20width%3D%221024%22%20height%3D%22461%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22461%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-308\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:461\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/cables.jpg 1024w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:135\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/cables.jpg 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:768\/h:346\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/cables.jpg 768w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:900\/h:405\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/cables.jpg 900w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:225\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/cables.jpg 500w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1280\/h:576\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/cables.jpg 1280w\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-opt-id=1694960042  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:461\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/switch.jpg\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"461\" data-id=\"307\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20461%22%20width%3D%221024%22%20height%3D%22461%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22461%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-307\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:461\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/switch.jpg 1024w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:135\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/switch.jpg 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:768\/h:346\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/switch.jpg 768w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:900\/h:405\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/switch.jpg 900w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:225\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/switch.jpg 500w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1280\/h:576\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/switch.jpg 1280w\" \/><\/figure>\n<\/figure>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img data-opt-id=1247563519  data-opt-src=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:461\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/laptops.jpg\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"461\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20461%22%20width%3D%221024%22%20height%3D%22461%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22461%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-311 size-full\" old-srcset=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1024\/h:461\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/laptops.jpg 1024w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:300\/h:135\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/laptops.jpg 300w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:768\/h:346\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/laptops.jpg 768w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:900\/h:405\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/laptops.jpg 900w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:500\/h:225\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/laptops.jpg 500w, https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1280\/h:576\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/laptops.jpg 1280w\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p><strong><span style=\"text-decoration: underline;\">My Laptops<\/span><\/strong><span style=\"text-decoration: underline;\"><strong>:<\/strong><\/span><br>HP-Victus <br>OS: Windows 11<br>RAM: 32GB DDR4<br>storage: 1.5TB NVMe SSD <br>GPU: Nvidia GTX 1650<br>GPU: AMD Radeon Graphics<br>CPU: Ryzen 5 5600H <br><br>Lenovo Thinkpad X250<br>OS: Black Arch<br>RAM: 16GB DDR4<br>Storage: 256 GB Sata SSD<br>CPU: Intel i5 8th gen<\/p>\n<\/div><\/div>\n\n\n\n<p>I hope You have enjoyed going through <strong>my Inventory<\/strong> u can contact me on my social handlers or <a href=\"http:\/\/wa.me\/+917022016113\">here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A home lab in cybersecurity serves as a vital training ground for aspiring professionals, allowing them to hone their skills in a<\/p>\n","protected":false},"author":1,"featured_media":180,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"iawp_total_views":54,"footnotes":""},"class_list":{"0":"post-93","1":"page","2":"type-page","3":"status-publish","4":"has-post-thumbnail","6":"col-md-12"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>My Inventory - yashinfosec.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/yashinfosec.com\/?page_id=93\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"My Inventory - yashinfosec.com\" \/>\n<meta property=\"og:description\" content=\"A home lab in cybersecurity serves as a vital training ground for aspiring professionals, allowing them to hone their skills in a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/yashinfosec.com\/?page_id=93\" \/>\n<meta property=\"og:site_name\" content=\"yashinfosec.com\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-17T14:14:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1599\/h:899\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/setup.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1599\" \/>\n\t<meta property=\"og:image:height\" content=\"899\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/yashinfosec.com\/?page_id=93\",\"url\":\"https:\/\/yashinfosec.com\/?page_id=93\",\"name\":\"My Inventory - yashinfosec.com\",\"isPartOf\":{\"@id\":\"https:\/\/yashinfosec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/yashinfosec.com\/?page_id=93#primaryimage\"},\"image\":{\"@id\":\"https:\/\/yashinfosec.com\/?page_id=93#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/setup.jpg\",\"datePublished\":\"2023-03-12T05:35:19+00:00\",\"dateModified\":\"2024-07-17T14:14:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/yashinfosec.com\/?page_id=93#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/yashinfosec.com\/?page_id=93\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/yashinfosec.com\/?page_id=93#primaryimage\",\"url\":\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/setup.jpg\",\"contentUrl\":\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/setup.jpg\",\"width\":1599,\"height\":899},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/yashinfosec.com\/?page_id=93#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/yashinfosec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"My Inventory\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/yashinfosec.com\/#website\",\"url\":\"https:\/\/yashinfosec.com\/\",\"name\":\"yashinfosec.com\",\"description\":\"Explore Security In-depth\",\"publisher\":{\"@id\":\"https:\/\/yashinfosec.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/yashinfosec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/yashinfosec.com\/#organization\",\"name\":\"yashinfosec.com\",\"url\":\"https:\/\/yashinfosec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/yashinfosec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/cropped-logo-1.png\",\"contentUrl\":\"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/cropped-logo-1.png\",\"width\":250,\"height\":250,\"caption\":\"yashinfosec.com\"},\"image\":{\"@id\":\"https:\/\/yashinfosec.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"My Inventory - yashinfosec.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/yashinfosec.com\/?page_id=93","og_locale":"en_US","og_type":"article","og_title":"My Inventory - yashinfosec.com","og_description":"A home lab in cybersecurity serves as a vital training ground for aspiring professionals, allowing them to hone their skills in a","og_url":"https:\/\/yashinfosec.com\/?page_id=93","og_site_name":"yashinfosec.com","article_modified_time":"2024-07-17T14:14:12+00:00","og_image":[{"width":1599,"height":899,"url":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:1599\/h:899\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/setup.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/yashinfosec.com\/?page_id=93","url":"https:\/\/yashinfosec.com\/?page_id=93","name":"My Inventory - yashinfosec.com","isPartOf":{"@id":"https:\/\/yashinfosec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/yashinfosec.com\/?page_id=93#primaryimage"},"image":{"@id":"https:\/\/yashinfosec.com\/?page_id=93#primaryimage"},"thumbnailUrl":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/setup.jpg","datePublished":"2023-03-12T05:35:19+00:00","dateModified":"2024-07-17T14:14:12+00:00","breadcrumb":{"@id":"https:\/\/yashinfosec.com\/?page_id=93#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/yashinfosec.com\/?page_id=93"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/yashinfosec.com\/?page_id=93#primaryimage","url":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/setup.jpg","contentUrl":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2024\/01\/setup.jpg","width":1599,"height":899},{"@type":"BreadcrumbList","@id":"https:\/\/yashinfosec.com\/?page_id=93#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/yashinfosec.com\/"},{"@type":"ListItem","position":2,"name":"My Inventory"}]},{"@type":"WebSite","@id":"https:\/\/yashinfosec.com\/#website","url":"https:\/\/yashinfosec.com\/","name":"yashinfosec.com","description":"Explore Security In-depth","publisher":{"@id":"https:\/\/yashinfosec.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/yashinfosec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/yashinfosec.com\/#organization","name":"yashinfosec.com","url":"https:\/\/yashinfosec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/yashinfosec.com\/#\/schema\/logo\/image\/","url":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/cropped-logo-1.png","contentUrl":"https:\/\/mlefs6wcwvfi.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/yashinfosec.com\/wp-content\/uploads\/2023\/03\/cropped-logo-1.png","width":250,"height":250,"caption":"yashinfosec.com"},"image":{"@id":"https:\/\/yashinfosec.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/pages\/93","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/yashinfosec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=93"}],"version-history":[{"count":24,"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/pages\/93\/revisions"}],"predecessor-version":[{"id":319,"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/pages\/93\/revisions\/319"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/yashinfosec.com\/index.php?rest_route=\/wp\/v2\/media\/180"}],"wp:attachment":[{"href":"https:\/\/yashinfosec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=93"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}