Toward the end, it shows a ELSA notice query where there are 5 notice types that occur with the demo pcap data that was processed.
One of them was a cymru notice and when I run the same pcaps through my instance of Security Onion and execute the ELSA sequence shown in the video, I only get 2 notice types and no cymru notices.
Has the automatic behavior of checking hashes with cymru been disabled in the default Security Onion configuration from the latest iso?
Can it be turned on for demonstration? I am teaching a class where it might be useful to have this effect occur.
Thanks
Jim
A dig command to cymru does not error out.
I notice that ELSA also reports no MD5 notices either. So if these are not there, then nothing will be sent to cymru.
I was able to go through almost all of the forensic analysis steps outlined in the Fall 2013 video sequence except for the Bro Notices query.
Odd.
Is there a bro setting for doing the MD5 computations?
Jim
On Wednesday, September 23, 2015 at 5:37:50 AM UTC-4, Doug Burks wrote:
> Hi Jim,
>
> Team Cymru Malware Hash Registry (MHR) matching should be turned on by
> default. You can verify as follows:
>
> grep detect-MHR /opt/bro/share/bro/site/local.bro
> @load frameworks/files/detect-MHR
>
> detect-MHR relies on sending DNS requests to Team Cymru, so have you
> verified that your box is able to do so?
>
The sostat-redacted output is at: http://pastebin.com/syKVpJGB
This is a plain demo Security Onion instance that I configured earlier this week from scratch. Running as a single VM in VMware Fusion 7.
Thanks for the continued interest in my attempt to follow along with the videos.
Jim
On Thursday, September 24, 2015 at 6:49:55 AM UTC-4, Doug Burks wrote:
Hi
Can you post the command you use to replay the traffic?
Also you are low on memory... You have the possibility to add some more to your VM, if possible double up.
Also try disabling some of the processes, https://github.com/Security-Onion-Solutions/security-onion/wiki/DisablingProcesses
prads
sancp_agent
pads_agent
http_agent
These processes writes it data to the Sguil database which is the same as Bro logs, https://github.com/Security-Onion-Solutions/security-onion/wiki/Best-Practices
Regards,
Lysemose
Some things change, some remain the same I guess.
Again, thanks for your interest.
Jim
On Tuesday, September 29, 2015 at 5:29:29 AM UTC-4, Doug Burks wrote:
> Hi Jim,
>
> I started with the latest ISO image (12.04.5.3) and ran the same
> tcpreplay commands you did:
>
> sudo tcpreplay -ieth1 -M10 /opt/samples/markofu/honeynet_suspicious-time.pcap
> sudo tcpreplay -ieth1 -M10 /opt/samples/markofu/outbound.pcap
> sudo tcpreplay -ieth1 -M10 /opt/samples/markofu/jackcr-challenge.pcap
> sudo tcpreplay -ieth1 -M10 /opt/samples/markofu/netforensics_evidence0*
>
> I got two notices in notice.log, one for a port scan and one for an
> invalid SSL cert.
>
> Bro doesn't generate a Notice for each and every MD5 hash that it
> sees, but it should generate an entry in files.log. So I can log into
> ELSA and click "Files - MIME Types" and see that I have 7
> application/x-dosexec files (Windows EXEs). I can also go to "HTTP -
> Sites Hosting EXEs" and see those same 7 Windows EXEs.
>
> If you're specifically looking for Team Cymru Malware Hash Registry
> (MHR) matches, then try the following tcpreplay:
> sudo tcpreplay -ieth1 -M10 /opt/samples/*.pcap
>
>
> On Tue, Sep 29, 2015 at 12:16 AM, Jim Solderitsch