Hey Doug,
Replies inline :D
On Monday, February 19, 2018 at 6:53:54 AM UTC-5, Doug Burks wrote:
> Hi Jay,
>
> Replies inline.
>
> On Sun, Feb 18, 2018 at 8:02 PM, Jay Hawk <> wrote:
> > Hey Doug,
> >
> > The biggest tool gap for me right now is being able to readily process large volumes of previously collected PCAP data and import that into Kibana without negatively affecting timestamps. While this can be accomplished the methods I've seen for this seem hackish as this just isn’t how SecurityOnion was built to function.
> >
> > But there would be a HUGE benefit to utilizing SecurityOnion in such a “mobile analysis” mode. If you have many customers in many different locations who collect PCAP but utilize it differently than you then this would be a solid middle ground.
>
> I have an idea for how we could implement a replay function that would
> retain timestamps, I just haven't had the time to implement it.
This is awesome and I'm eager to see what you have in mind, please let me know if you need any testers when you find the time to work on this.
> > Another big thing is correlating data points back to PCAP easily, there are several instances where quickly transitioning to the correct PCAP files related to an event don’t seem possible via kibana and require manual command-line searches of that PCAP data. This happens for example with:
> > IPV6
> > Port not specified
> > Not TCP or UDP
>
> How often does this happen?
This happens every time I've tried to transition to CapMe via an _id value on IPV6 Traffic and there is a fair amount of IPV6 in the network I monitor. Capme says: "Destination IP is IPV6! CapMe currently only supports IPV4"
This also happens when attempting to view packet data related to ICMP or other non-TCP/UDP protocols. Giving the "CapMe Currently only supports TCP and UDP".
This also has happened when attempting to view events related to and "unknown_protocol..." from bro_weird where I receive a "Missing destination port"
If I were to give you a percentage of total traffic that causes this issue I'd say 25% at most, however traffic that generates these types of issue tend to be a bit more interesting.. having traffic with unknown protocols for example is something I'd want to investigate.
Not bad.
These network diagram visuals look great and go way beyond what I was expecting.
https://vega.github.io/vega/examples/
The Kibana community is really giving Splunk a run for their money. Looking forward to RC3.
> > I also feel the help page inside of SecurityOnion could be fleshed out, I think Molochs use of the Markdown/Help page is on point. As it acts as a mobile wiki/reference all by itself. Building this out could make the transition from ELSA to Elastic a lot easier. I plan on building out this type of help page for my team as a reference
> > Their implementation:
https://demo.molo.ch/help?date=-1#sessions
>
> We recently rewrote our Help page and have plans on extending it as well.
Couldn't locate the file in your github, but I look forward to seeing it after the update.
> >
> > There may be something to their implimentation of cyberchef when performing network analysis.
https://gchq.github.io/CyberChef/
> >
> > While it clearly has more applications in malware analysis the Entropy detection, deobfuscation, regex searching, exif extraction, hashing, etc still have applications in network analysis and could make life easier in some instances.
>
> Yes, I've seen cyberchef and we may add it at some point as well.
>
> > That said, you guys are doing amazing work, and I look forward to setting up the latest release.
>
> RC2 is scheduled for release tomorrow, but you can test it today if you like!
>
https://groups.google.com/d/topic/security-onion-testing/_NuzYTnN38c/discussion
>
> Thanks!
Nice, installing now! Thanks for everything you guys are doing!
>
> --
> Doug Burks