MODULE 26 - CERTIFICATION REVISION PREPARATION Flashcards
Security Onion Security Onion is an open-source suite of Network Security Monitoring (NSM) tools that run on an Ubuntu Linux distribution.
Security Onion Security Onion is an open-source suite of Network Security Monitoring (NSM) tools that run on an Ubuntu Linux distribution.
Security Onion Security Onion tools provide three core functions for the cybersecurity analyst:
full packet capture and data types,
network-based and
host-based intrusion detection systems, and
alert analyst tools.
Security Onion Security Onion tools provide three core functions for the cybersecurity analyst:
full packet capture and data types,
network-based and
host-based intrusion detection systems, and
alert analyst tools.
Security Onion Security Onion can be installed as a standalone installation or as a sensor and server platform.
Some components of Security Onion are owned and maintained by corporations, such as Cisco and Riverbend Technologies, but are made available as open source.
Security Onion Security Onion can be installed as a standalone installation or as a sensor and server platform.
Some components of Security Onion are owned and maintained by corporations, such as Cisco and Riverbend Technologies, but are made available as open source.
Detection Tools for Collecting Alert Data Security Onion contains many components.
It is an integrated environment which is designed to simplify the deployment of a comprehensive NSM solution.
The figure illustrates a simplified view of the way in which some of the components of the Security Onion work together.
It is an integrated environment which is designed to simplify the deployment of a comprehensive NSM solution.
The figure illustrates a simplified view of the way in which some of the components of the Security Onion work together.
Detection Tools for Collecting Alert Data A Security Onion Architecture
https://snipboard.io/41wWVi.jpg
https://snipboard.io/41wWVi.jpg
A Security Onion Architecture:
–capME
–SNORT
– ZEEK
– OSSEC
– WAZUH
– SURICATA
–capME
–SNORT
– ZEEK
– OSSEC
– WAZUH
– SURICATA
A Security Onion Architecture:
–capME
–SNORT
– ZEEK
– OSSEC
– WAZUH
– SURICATA
– capME
This is a web application that allows viewing of pcap transcripts rendered with the tcpflow or Zeek tools.
CapME can be accessed from the Enterprise Log Search and Archive (ELSA) tool.
CapME provides the cybersecurity analyst with an easy-to-read means of viewing an entire Layer 4 session.
CapME acts as a plugin to ELSA and provides access to relevant pcap files that can be opened in Wireshark.
A Security Onion Architecture:
–capME
–SNORT
– ZEEK
– OSSEC
– WAZUH
– SURICATA
– SNORT
This is a Network Intrusion Detection System (NIDS).
It is an important source of alert data that is indexed in the Sguil analysis tool.
Snort uses rules and signatures to generate alerts.
Snort can automatically download new rules using the PulledPork component of Security Onion.
Snort and PulledPork are open source tools that are sponsored by Cisco.
A Security Onion Architecture:
–capME
–SNORT
– ZEEK
– OSSEC
– WAZUH
– SURICATA
– ZEEK
Formerly known as Bro.
This is a NIDS that uses more of a behavior-based approach to intrusion detection.
Rather than using signatures or rules, Zeek uses policies, in the form of scripts that determine what data to log and when to issue alert notifications.
Zeek can also submit file attachments for malware analysis, block access to malicious locations, and shut down a computer that appears to be violating security policies.
Note: Some interfaces within Security Onion have yet to be updated with the Bro to Zeek name change.
A Security Onion Architecture:
–capME
–SNORT
– ZEEK
– OSSEC
– WAZUH
– SURICATA
– OSSEC
This is a host-based intrusion detection system (HIDS) that is integrated into Security Onion.
It actively monitors host system operations, including conducting file integrity monitoring, local log monitoring, system process monitoring, and rootkit detection.
OSSEC alerts and log data are available to Sguil and Kibana.
OSSEC requires an agent to be running on the Windows computers in the enterprise.
A Security Onion Architecture:
–capME
–SNORT
– ZEEK
– OSSEC
– WAZUH
– SURICATA
– WAZUH
Wazuh is a HIDS that will replace OSSEC in Security Onion.
It is a full-featured solution that provides a broad spectrum of endpoint protection mechanisms including host logfile analysis, file integrity monitoring, vulnerability detection, configuration assessment, and incident response.
Like OSSEC, it requires agents to be running on network hosts.
A Security Onion Architecture:
–capME
–SNORT
– ZEEK
– OSSEC
– WAZUH
– SURICATA
– SURICATA
This is a NIDS that uses a signature-based approach.
It can also be used for inline intrusion prevention.
It is similar to Zeek; however, Suricata uses native multithreading, which allows the distribution of packet stream processing across multiple processor cores.
It also includes some additional features such as reputation-based blocking and support for Graphics Processing Unit (GPU) multithreading for performance improvement.
Analysis Tools Security Onion integrates these various types of data and Intrusion Detection System (IDS) logs into a single platform through the following tools:
– Sguil
– Kibana
– Wireshark
– Zeek
Analysis Tools Security Onion integrates these various types of data and Intrusion Detection System (IDS) logs into a single platform through the following tools:
– Sguil
– Kibana
– Wireshark
– Zeek
Analysis Tools:
Analysis Tools Security Onion integrates these various types of data and Intrusion Detection System (IDS) logs into a single platform through the following tools:
– Sguil
– Kibana
– Wireshark
– Zeek
– Sguil
This provides a high-level console for investigating security alerts from a wide variety of sources.
Sguil serves as a starting point in the investigation of security alerts.
A wide variety of data sources are available to the cybersecurity analyst by pivoting directly from Sguil to other tools.
Analysis Tools :
Analysis Tools Security Onion integrates these various types of data and Intrusion Detection System (IDS) logs into a single platform through the following tools:
– Sguil
– Kibana
– Wireshark
– Zeek
– Kibana
Kibana is an interactive dashboard interface to Elasticsearch data.
It allows querying of NSM data and provides flexible visualizations of that data.
It provides data exploration and machine learning data analysis features.
It is possible to pivot from Sguil directly into Kibana to see contextualized displays based on the source and destination IP addresses that are associated with an alert.
Search the internet and visit the elastic.co website to learn more about the many features of Kibana.
Analysis Tools :
Analysis Tools :
Analysis Tools Security Onion integrates these various types of data and Intrusion Detection System (IDS) logs into a single platform through the following tools:
– Sguil
– Kibana
– Wireshark
– Zeek
– Wireshark
This is a packet capture application that is integrated into the Security Onion suite.
It can be opened directly from other tools and will display full packet captures relevant to an analysis.
Analysis Tools :
Analysis Tools :
Analysis Tools :
Analysis Tools Security Onion integrates these various types of data and Intrusion Detection System (IDS) logs into a single platform through the following tools:
– Sguil
– Kibana
– Wireshark
– Zeek
– Zeek
This is a network traffic analyzer that serves as a security monitor.
Zeek inspects all traffic on a network segment and enables in-depth analysis of that data.
Pivoting from Sguil into Zeek provides access to very accurate transaction logs, file content, and customized output.
Alert Generation Security alerts are notification messages that are generated by NSM tools, systems, and security devices.
Alerts can come in many forms depending on the source.
For example, syslog provides support for severity ratings which can be used to alert cybersecurity analysts regarding events that require attention.
Alert Generation Security alerts are notification messages that are generated by NSM tools, systems, and security devices.
Alerts can come in many forms depending on the source.
For example, syslog provides support for severity ratings which can be used to alert cybersecurity analysts regarding events that require attention.
Alert Generation In Security Onion
Sguil provides a console that integrates alerts from multiple sources into a timestamped queue.
A cybersecurity analyst can work through the security queue investigating, classifying, escalating, or retiring alerts.
Sguil provides a console that integrates alerts from multiple sources into a timestamped queue.
A cybersecurity analyst can work through the security queue investigating, classifying, escalating, or retiring alerts.
Alert Generation Instead of using a dedicated workflow management system such as Request Tracker for Incident Response (RTIR), a cybersecurity analyst would use the output of an application like Sguil to orchestrate an NSM investigation.
Alert Generation Instead of using a dedicated workflow management system such as Request Tracker for Incident Response (RTIR), a cybersecurity analyst would use the output of an application like Sguil to orchestrate an NSM investigation.
Alert Generation Alerts will generally include five-tuples information when available, as well as timestamps and information identifying which device or system generated the alert.
Recall that the five-tuples includes the following information for tracking a conversation between a source and destination application:
Alert Generation Alerts will generally include five-tuples information when available, as well as timestamps and information identifying which device or system generated the alert.
Recall that the five-tuples includes the following information for tracking a conversation between a source and destination application:
Alert Generation Recall that the five-tuples includes the following information for tracking a conversation between a source and destination application:
SrcIP - the source IP address for the event.
SPort - the source (local) Layer 4 port for the event.
DstIP - the destination IP for the event.
DPort - the destination Layer 4 port for the event.
Pr - the IP protocol number for the event.
Alert Generation Recall that the five-tuples includes the following information for tracking a conversation between a source and destination application:
SrcIP - the source IP address for the event.
SPort - the source (local) Layer 4 port for the event.
DstIP - the destination IP for the event.
DPort - the destination Layer 4 port for the event.
Pr - the IP protocol number for the event.
Alert Generation
Additional information could be whether a permit or deny decision was applied to the traffic, some captured data from the packet payload, or a hash value for a downloaded file, or any of a variety of data.
Alert Generation
Additional information could be whether a permit or deny decision was applied to the traffic, some captured data from the packet payload, or a hash value for a downloaded file, or any of a variety of data.
Alert Generation
The figure shows the Sguil application window with the queue of alerts that are waiting to be investigated in the top portion of the interface.
Sguil Window
https://snipboard.io/rVPHYb.jpg
Alert Generation
The figure shows the Sguil application window with the queue of alerts that are waiting to be investigated in the top portion of the interface.
Sguil Window
https://snipboard.io/rVPHYb.jpg
Alert Generation:
The fields available for the real-time events are as follows:
– ST
– CNT
– Sensor
– Alert ID
– Date/Time
– Event Message
Alert Generation:
The fields available for the real-time events are as follows:
– ST
– CNT
– Sensor
– Alert ID
– Date/Time
– Event Message
Alert Generation:
The fields available for the real-time events : ST
Alert Generation:
The fields available for the real-time events are as follows:
– ST
– CNT
– Sensor
– Alert ID
– Date/Time
– Event Message
–ST
This is the status of the event. RT means real time.
The event is color-coded by priority.
The priorities are based on the category of the alert.
There are four priority levels: very low, low, medium, and high.
The colors range from light yellow to red as the priority increases.
Alert Generation:
The fields available for the real-time events :
The fields available for the real-time events are as follows:
– ST
– CNT
– Sensor
– Alert ID
– Date/Time
– Event Message
- CNT
This is the count for the number of times this event has been detected for the same source and destination IP address.
The system has determined that this set of events is correlated.
Rather than reporting each in a potentially long series of correlated events in this window, the event is listed once with the number of times it has been detected in this column.
High numbers here can represent a security problem or the need for tuning of the event signatures to limit the number of potentially spurious events that are being reported.
Alert Generation: The fields available for the real-time events :
The fields available for the real-time events are as follows:
– ST
– CNT
– Sensor
– Alert ID
– Date/Time
– Event Message
– Sensor
This is the agent reporting the event. The available sensors and their identifying numbers can be found in the Agent Status tab of the pane which appears below the events window on the left.
These numbers are also used in the Alert ID column.
From the Agent Status pane, we can see that OSSEC, pcap, and Snort sensors are reporting to Sguil.
In addition, we can see the default hostnames for these sensors, which includes the monitoring interface.
Note that each monitoring interface has both pcap and Snort data associated with it.
Alert Generation: The fields available for the real-time events : Alert ID
The fields available for the real-time events are as follows:
– ST
– CNT
– Sensor
– Alert ID
– Date/Time
– Event Message
– Alert ID
This two-part number represents the sensor that has reported the problem and the event number for that sensor.
We can see from the figure that the largest number of events that are displayed are from the OSSEC sensor (1).
The OSSEC sensor has reported eight sets of correlated events.
Of these events, 232 have been reported with event ID 1.24.
Alert Generation: The fields available for the real-time events : Date/Time
The fields available for the real-time events are as follows:
– ST
– CNT
– Sensor
– Alert ID
– Date/Time
– Event Message
– Date/Time
This is the timestamp for the event.
In the case of correlated events, it is the timestamp for the first event.
Alert Generation: The fields available for the real-time events : Event Message
The fields available for the real-time events are as follows:
– ST
– CNT
– Sensor
– Alert ID
– Date/Time
– Event Message
– Event Message
This is the identifying text for the event.
This is configured in the rule that triggered the alert.
The associated rule can be viewed in the right-hand pane, just above the packet data.
To display the rule, the Show Rule checkbox must be selected.
Alert Generation:
Depending on the security technology, alerts can be generated based on rules, signatures, anomalies, or behaviors.
No matter how they are generated, the conditions that trigger an alert must be predefined in some manner.
Alert Generation:
Depending on the security technology, alerts can be generated based on rules, signatures, anomalies, or behaviors.
No matter how they are generated, the conditions that trigger an alert must be predefined in some manner.
Rules and Alerts Alerts can come from a number of sources:
NIDS
HIDS
Asset management and monitoring
HTTP, DNS, and TCP transactions
Syslog messages
Rules and Alerts Alerts can come from a number of sources:
NIDS
HIDS
Asset management and monitoring
HTTP, DNS, and TCP transactions
Syslog messages
Rules and Alerts Alerts can come from a number of sources: NIDS
Rules and Alerts Alerts can come from a number of sources:
NIDS
HIDS
Asset management and monitoring
HTTP, DNS, and TCP transactions
Syslog messages
– NIDS
Snort, Zeek, and Suricata
Rules and Alerts Alerts can come from a number of sources: HIDS
Rules and Alerts Alerts can come from a number of sources:
NIDS
HIDS
Asset management and monitoring
HTTP, DNS, and TCP transactions
Syslog messages
– HIDS
OSSEC, Wazuh
Rules and Alerts Alerts can come from a number of sources: Asset management and monitoring
Rules and Alerts Alerts can come from a number of sources:
NIDS
HIDS
Asset management and monitoring
HTTP, DNS, and TCP transactions
Syslog messages
– Assest Management and Monitoring
Passive Asset Detection System (PADS)