I've searched the Wiki and this mailing list but can't find instructions for manually enabling full packet capture. I'd like to be able to turn it on and back off as needed without re-running SOSETUP, since we've already done a decent bit of configuration. Is this possible?
Thanks,
de
Thanks for your reply. I did see the ability to disable, and actually followed those instructions to disable Snorby after seeing that it was to be excluded from future updates.
I guess the question should have been how to enable packet capture after already running setup, so that I can enable/disable as needed. I've got a week's worth of effort invested in configuring and tuning SO, so I would rather not lose that by re-running setup. Is there a guide to manually enabling netsniff-ng, and what other components would need to be enabled with it?
Thanks,
de
Is the pcap service and pcap dailylogs the only service/files that have any reference to packet contents? I need to ensure I don't inadvertently store packet contents. And, if i do with the pcap service, I need to ensure I can safely wipe all pcaps when needed, which is why I am asking if deleting dailylogs will that suffice?
What services in SO will store and/or index packet *contents* ? Is it only the pcap service?
I have some sensitive information in HTTP POSTs. I therefore place a BPF filter on those packets - do not capture.
ELSA still stores and indexes the TCP headers (which I am ok with as it gives me some meta info). When attempted to pivot to capME, the result fails as the pcaps don't exist. This is ok.
I just want to clarify there is no deep packet analysis stored or indexed anywhere, other than /nsm/sensor_data/HOSTNAME-INTERFACE/dailylogs/YYYY-MM-DD/ ?
Thanks
So, for example, I deleted everything from -
/nsm/sensor_data/hostname/dailylogs/*
I then went and viewed a PADS Asset entry in Squert and drilled down to "Generate Transcript". Low and behold it pulled up the pcap.
Is this an example you are referring to ? This is pulling from the squil db?
I guess I have some more research to do. I would like to find a definitive way to wipe packet contents when needed.
Thanks
rm -f /nsm/sensor_data/*-*/dailylogs/*/snort.log.*
rm -f /nsm/server_data/securityonion/archive/*/*-*/*.raw
Thanks
Also - if I have BPF filter in place to drop everything for a specific port, ELSA still appears to log the packet headers under "destination ports". CapMe cannot pull up the packet however (which is good).
If I have that BPF filter in place, can other sensors still potentially store and index that packet content?
Is there a diagram or chart describing the path of logged packets, and how they may be treated throughout SO depending on services installed?
Re: ELSA - the BPF is only referencing HTTP POST traffic in one direction, but what is returned by the application is fine to pcap. It does partially break the capMe view as expected.