AWS at Home
A Hacker’s Guide to Proxmox on an Intel NUC
🧪 Spin up, detonate, and destroy virtual machines like a cloud-native mad scientist — all from the comfort of your basement.
If you’re a security researcher, penetration tester, or malware analyst, you’ve likely dreamt of having your own self-hosted cloud to spin up VMs with surgical precision. The good news? You can — and all you need is a modest Intel NUC and a Proxmox ISO.
Welcome to AWS at home, where you build your own hypervisor, private cloud, and malware lab — for free.
🧠 Why Proxmox?
Proxmox VE is a free, open-source, enterprise-grade virtualization platform that runs on bare metal and gives you:
KVM for full virtualization (perfect for Windows malware labs)
LXC containers (for lightweight Linux workloads)
Powerful snapshot, rollback, and cloning tools
A clean web UI, CLI, and API
Advanced networking with VLANs and virtual bridges
Cluster, ZFS, and Ceph support — if you want to scale
It’s like running your own datacenter — without the AWS bill.
🧰 What You Need
💾 Hardware
Intel NUC (any model with VT-x and VT-d support)
Minimum: 8 GB RAM (16+ GB ideal)
SSD (faster disks = better ZFS performance)
USB flash drive (4 GB+)
🔧 Software
Latest Proxmox VE ISO
USB flashing tool: balenaEtcher or Rufus
Another device to access the Proxmox Web GUI
🛠️ Step 1: Prep the BIOS
Boot into the BIOS (
F2
/DEL
on boot)Enable:
VT-x
(Intel Virtualization Technology)VT-d
(for PCI passthrough)UEFI boot
Disable:
Secure Boot
Save and exit
🔥 Step 2: Create a Proxmox Bootable USB
Download the Proxmox ISO from here
Plug into your NUC and boot from the USB (usually
F10
orF12
to select boot device)
💻 Step 3: Install Proxmox VE
Select "Install Proxmox VE"
Choose your SSD as the install target (⚠️ this wipes the disk)
Choose a filesystem:
ZFS
if you want snapshots + redundancy (requires more RAM)ext4
if you want simplicity
Set:
Hostname (e.g.,
proxmox-nuc
)Root password + email
Static IP (recommended)
Once done, Proxmox will install and reboot.
🌐 Step 4: Access the Web Interface
From another machine on the same LAN:
cppCopyEdithttps://<proxmox-ip>:8006
Login with:
Username:
root
Password: what you just set
Ignore the certificate warning — it’s self-signed.
🔄 Step 5: Update Proxmox + Remove Nag
Update the system:
bashCopyEditapt update && apt full-upgrade
Enable no-subscription repository:
bashCopyEditnano /etc/apt/sources.list.d/pve-enterprise.list
Comment out the enterprise repo and add:
nginxCopyEditdeb http://download.proxmox.com/debian/pve bookworm pve-no-subscription
Then:
bashCopyEditapt update && apt dist-upgrade
(Optional) Remove subscription nag:
Edit:
bashCopyEditnano /usr/share/javascript/proxmox-widget-toolkit/proxmoxlib.js
Find:
jsCopyEditif (data.status !== 'Active') {
Replace with:
jsCopyEditif (false) {
Clear browser cache, refresh.
🧪 Step 6: Begin Malware Lab Magic
From the Proxmox dashboard, you can now:
Upload Windows 10 ISOs
Create and clone malware VMs
Configure isolated networks (
vmbr1
) to keep samples containedSnapshots before detonations, rollback when done
Monitor with Wireshark, Procmon, tcpdump, Suricata, ELK — your call
🔐 Bonus: VPN Into Your Lab
Want remote access? Run WireGuard or Tailscale on your home network:
SSH into Proxmox from anywhere
Access web UI securely
RDP into isolated malware VMs
You can even route C2 domains back into your lab for dynamic analysis.
🚀 Final Thoughts
Proxmox gives you:
Full control over your malware testing lab
A better understanding of hypervisors, networking, and cloud infrastructure
A clean, powerful interface with snapshots, templates, and automation
And the best part? It’s free. You just built your own private AWS.
Last updated