티스토리 뷰

IS

Security Onion 설치

Dreamtect 2015. 3. 4. 10:24

 

Security Onion 설치

Security Onion Video Playlist 정리

 

* 참고용 동영상 - 라이브이미지 제작자가 설명하는 자료인데, 짧게 IDS 이벤트 및 패킷 분석 방법 등을 볼 수 있음.

 

출처: <https://code.google.com/p/security-onion/wiki/Videos>

 

  1. Install
  2. Advanced setup

Eth0 - management

Eth1 - monitor

 

Standalone

Snort

GPL

Eth1

Enable ids engine

Enable bro

Enable http

Dis aruis

Ena prad

Full packet capture

Enable salt

Enable elsa

Sudo salt '*' test.ping

Sudo salt '*' cmd.run 'service nsm status'

 

  1. Update

Sudo soup

 

  1. 해상도 변경

Xrandr

Xrandr -s 1024x768

 

  1. Tcp replay(Pcap 파일 replay)

sudo tcpreplay -ieth1 -M10 /opt/samples/markofu/honeynet_suspicious-time.pcap

more /nsm/bro/logs/current/conn.log

sudo tcpreplay -ieth1 -M10 /opt/samples/markofu/outbound.pcap

sudo tcpreplay -ieth1 -M10 /opt/samples/markofu/jackcr-challenge.pcap

sudo tcpreplay -ieth1 -M10 /opt/samples/markofu/netforensics_evidence0*

 

  1. Snorby

Event > Packet capture option > custom > fetch packe>> capME - capture  패킷에서 의심되는 IP추출함.

Search > src IP or dst ip  의심가는 IP 검색

  1. Squert

Filter > 의심되는 IP 검색 'IP 221.54.197.32'

Filter > 의심되는 IP를 검색 'Ip 172.16.150.20'

Sudo vi /var/www/squert/.inc/config.php --> sguil 설정에 사용자암호 입력

Queue 에서 'TX' 클릭

  1. Sguil

21 포트로 정렬 더블클릭 패킷덤프 나옴

우클릭 Quick query>query sancp table>query dstIP

CNX ID 우클릭> wireshark > follow tcp stream > Save as > ..out.rar

트래픽재생을 통해서 파일 추출

Asdf

Sguil에서 Exe 찾은  wireshark > file > export > object > http

Sguil 에서 exe 이벤트 찾은  network miner > files > open

 

  1. Elsa

Add term > BRO_!!!!

 

  1. OSSEC and ELSA

Server 추가 설치

 

Dis salt

공지사항
최근에 올라온 글
최근에 달린 댓글
Total
Today
Yesterday
링크
«   2025/05   »
1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
글 보관함