Here's my SO, incident response check list:
SO Processes
*Workstations Investigations*:
1. Squil
2. ELSA on IP (May need to increase limit (i.e. limit:5000)
3. Programs (to see various BRO associations with programs i.e. HTTP)
4. srcip & dstip (follow any additional hosts)
4.5 Group by destination port
5. check /nsm/bro/current/capture_loss.log
6. check /nsm/sensor_data/<interface>/dailylogs/date (netsniff-ng)
7. bro -r snort*.log ls -al check logs (i.e. dns.log on sensors)
argus
racluster -n -r 2015-02-09.log - host 10.11.11.11
ra -n -r logfile - tcp and dst port 21 -s stime saddr sport daddr dport sbytes dbytes
-n don't resolve port numbers to names
-s which fields to display
-m saddr daddr groups by source and destination
tshark
sudo tshark -t ad -n -r dailylog-snort-file -R 'tcp.port==80 and http'
-t set format of packet timestamp
-n disable network object name resolution
-r read packet input file
-R apply filter
ELSA getPcap and query for "event"" info instead of "sancp" info
Servers:
General:
sudo service nsm status
sudo nsm_sensor_ps-start --only-argus
sudo sostat
ELSA:
You can add the keywords after the search terms
+program="ossec_archive" limit:10000 keyword thekeyword
zcat for extracting info from bro logs
zcat <log file> |bro-cut -d|grep <ip or other info>
tcpflow -r snort.log.filenname port 20 (or other port)
tcpflow reconstructs sessions
/etc/nsm/interface-name/sensor.conf for agent startup options.
/etc/nsm/securityonion/sguild.email