Security Onion BDR2: Electric Boogaloo

It looks like things are coming along quite nicely with the recent rebuild effort of Security Onion for Ubuntu 14.04 LTS.

Doug Burks recently announced and invited others to be involved in the testing of in-place upgrades for Security Onion from Ubuntu 12.04 to 14.04, here:

http://blog.securityonion.net/2015/11/bdr2-testers-wanted.html

Burks and team have been working hard to rebuild the numerous packages included with the Security Onion distribution since the announcement of the rebuild back in September.

http://blog.securityonion.net/2015/09/bdr2-electric-boogaloo-towards-ubuntu.html).

The new effort, titled BDR2 (Big Distro Rebuild 2), affords NSM practitioners the ability to use a more updated, supported version of Ubuntu.  For those of you who are not aware of Security Onion, it “is a Linux distro for intrusion detection, network security monitoring, and log management”.  The distro neatly and effectively ties together many open source components/tools to assist an analyst in an everyday capacity.  These tools include:

Snort/Suricata: Intrustion detection (https://www.snort.org/ , http://suricata-ids.org/)

Bro: Network analysis framework (https://www.bro.org/)

OSSEC: HIDS, File-based integrity monitoring, active response (https://ossec.github.io/)

Sguil: Store and view alert data; Integration with Security Onion allows for quick pivoting between different tools/datatypes (https://bammv.github.io/sguil/index.html)

ELSA: Enterprise Log and Search Engine; Can store a massive amount of logs; Uses Sphinx to make searching of indexed logs a snap; Custom hooks and queries packaged with Security Onion allows an analyst to quickly and easily investigate suspicious activity and pivot between data types (https://code.google.com/p/enterprise-log-search-and-archive/)

Squert: Web interface for Sguil (http://www.squertproject.org/)

Xplico: Network forensics tool; Dissect and review PCAPs, manage cases (http://www.xplico.org/)

NetworkMiner:  Can be used as a passive sniffer, but in Security Onion is mostly used for parsing PCAPs to retrieve hostnames, images, files, etc (http://www.netresec.com/?page=NetworkMiner)

CapMe: Allows for generation of a PCAP/transcript; Currenlt used when pivoting from ELSA (https://github.com/int13h/capme)

syslog-ng: Transports syslog for log storage and analysis (https://www.balabit.com/network-security/syslog-ng)

PF_RING: Uses a zero-copy mechanism to efficiently copy packets off the wire (http://www.ntop.org/products/packet-capture/pf_ring/)

barnyard2: Interpreter for Snort unified2 files; allows Snort to write to disk in a efficient manner (https://github.com/firnsy/barnyard2)

These are just some of the components/tools that tie it all together for Security Onion.

For more information, you can visit the Security Onion wiki, here:

https://github.com/Security-Onion-Solutions/security-onion/wiki

or the blog, here:

http://blog.securityonion.net/

Welcome…to the NSM Life

This blog was established as a means of tracking my efforts as a network security enthusiast and practitioner, to force myself to learn new concepts and new technologies, to teach and learn from others, and to lend greater credence to and recognize the hard work that is put forth every day in regard to the development and refinement of open source solutions for detecting and responding to malicious threats and performing network security monitoring.  The people who often work long hours, uncompensated, and continually obsess over the minute details and capabilities of these  tools are the ones who are dedicated to keeping our networks and our data safer, and without them, we’d be much worse off. These people do this out of passion, a longing to provide a solution, and a desire to positively enhance overall security posture for the greater good–these are our real heroes in this day and age.   With the current open source NSM (network security monitoring) tools available, one would be hard-pressed to find an excuse to not effectively monitor their network (for FREE).

Again, I hope to provide insight and to learn from each and every one of you.  Whether you are just starting out with NSM, or a seasoned expert, I hope that each and every one of you that happens to stumble across this blog  finds something of value.  Welcome to the NSM life.