Hi Jeshrel,
Replies inline.
On Sat, Jan 3, 2015 at 1:41 AM, Jeshrel <
rac...@gmail.com> wrote:
> Hi,
>
> I have SO on a server and we are going to setup SO from Scratch, we have a security activity on the 23 of December and we had used SO as NSM and it performed really good.
>
> Now i would like to discard the server but would like all the logs and data of
>
> 1) BRO IDS alerts & logs
All Bro data is stored in /nsm/bro/.
> 2) Packet Capture
All packet capture data is stored in
/nsm/sensor_data/HOSTNAME-INTERFACE/dailylogs/.
> 3) Snort IDS alerts and logs
Snort alerts go to 3 destinations by default:
1. Snorby database
2. Sguil database
3. ELSA database
You can use standard MySQL tools to export one or more of these databases.
Depending on what you need, you may be able to just grab the alerts
from the Sguil log at /var/log/nsm/securityonion/sguild.log:
grep "Alert Received" /var/log/nsm/securityonion/sguild.log*
> 3) tcpreplay
Not sure what you mean by this. tcpreplay is a tool used to replay
pcaps to an ethernet interface.
> 4) transcript
Transcripts are rendered on-the-fly when an analyst requests it from
the full packet capture in
/nsm/sensor_data/HOSTNAME-INTERFACE/dailylogs/. So as long as you
have the full packet capture from that directory, you can create any
transcript you want using tcpflow.
--
Doug Burks
Need Security Onion Training or Commercial Support?
http://securityonionsolutions.com