Hi Stephane
I can see that Wazuh can not detect the dsniff util as there is no rule to detect it.
You can do this following the workaround.
Add this configuration to the agent.conf of groups to detect a running process for a group of agent
<localfile>
<log_format>full_command</log_format>
<alias>process list</alias>
<command>ps -e -o pid,uname,command</command>
<frequency>30</frequency>
</localfile>
Ref: https://documentation.wazuh.com/current/user-manual/reference/centralized-configuration.html
Next, add this custom rule to detect running commands related to Dsniff util commands.
<group name="ossec,">
<rule id="100050" level="0">
<if_sid>530</if_sid>
<match>^ossec: output: 'process list'</match>
<description>List of running processes.</description>
<group>process_monitor,</group>
</rule>
<rule id="100051" level="7">
<if_sid>100050</if_sid>
<match>arpspoof|dsniff</match>
<description>Dsniff uitl is runnig</description>
<group>process_monitor,</group>
</rule>
</group>
Ref: https://documentation.wazuh.com/current/user-manual/ruleset/rules/custom.html
After adding the rule restart the manager.
Now run this command.
sudo arpspoof 192.168.65.128 -t 192.168.65.133
This should reflect an alert on your dashboard.
I hope you find this information helpful.
Yes, you need to define the patterns in the rule to detect it.
As I explained earlier Wazuh detects alerts based on logs forwarded to Wazuh and corresponding rules. You can use different NIDS tools and use logs from those tools to forward to Wazuh to trigger alerts.
I hope you find this information helpful.