SlideShare a Scribd company logo
Introductions
• Brad Shoop - @bradshoop – http://eyeis.net
– IT since mid-90s, security-focused since 2006 (GCIH GCFA)
– Doc, testing and marketing contributor to Security Onion
– Technical Editor, The Practice of NSM (a must read!)
– Author Security Onion for Splunk apps
– Currently work for Mandiant
• Chris Rimondi - @crimondi - http://www.securitygrit.com/
– Father of three boys ages four and under
• Including one < month old!
– Former IT Director & Former Security Consultant
– Now with Mandiant
– ISSA Board Member Chattanooga
Agenda
• Big Data and Security Onion
• Splunk vs ELSA
• Splunk app
• What is ELSA? - Architecture Overview
• Integrating Conditional Data
• Dashboards
Security Onion Makes A Lot of
Data
ELSA
Bro IDS
Snort/Suricata
OSSEC
SecOps Needs More Data
ELSA
Firewalls
Windows
Syslog
Splunk vs ELSA
Splunk ELSA
Google-style search Google-style search
Event parsing Event parsing
Custom visualization Basic visualization
Custom dashboard capability Basic dashboard capability
Fast (but not “ELSA fast”) Sub-second searches
Multi-field groupbys Single field groupbys
$$$ Open Source (GNU GPL v2)
Splunk vs. ELSA
Learning with SO for Splunk
• Learn the logs!
• Follow the uid!
• Understand how logged events relate across
toolsets:
– Bro – context & alerts
– Snort/Suricata – alerts
– OSSEC – alerts
• Identify normal from anomalous
Security Onion for Splunk Demo
• Security Onion for Splunk
– http://splunk-base.splunk.com/apps/45784/security-onion
• Security Onion Server/Sensor Add-on
– http://splunk-base.splunk.com/apps/52461/security-onion-
serversensor-add-on
ELSA Architecture
ELSA WebAPI Architecture
SO Sensor/
ELSA Peer or
Forwarder
SO Sensor/
ELSA Peer or
Forwarder
SO Sensor/
ELSA Peer or
Forwarder
SO Server/
ELSA Master
Firewalls Sysloggers
ELSA
Forwarder
Windows
Network Network Network
SSL
Syslog/SSL
SO Sensor ELSA as peer
or forwarder.
Peer mode: events
indexed locally and
queried remotely from
the Master
Forwarder mode: events
are
parsed, compressed, the
n forwarded via SSL to
Master node for
indexing.
Yes, it can do both!
elsa_web.conf
apikeys: username (“secops”) and apikey (“001”) for web API authentication
peers: the local ELSA instance and ELSA Peers the instance has access to query.
Standalone ELSA Master
apikeys": { ”secops": ”001" },
"peers": {
"127.0.0.1": {
"url": "http://127.0.0.1/",
"username": ”secops",
"apikey": ”001"
}
},
ELSA Master with 1 Peer
apikeys": { ”secops": ”001" },
"peers": {
"127.0.0.1": {
"url": "http://127.0.0.1/",
"username": ”secops",
"apikey": ”001"
},
”192.168.0.10": {
"url": "http://192.168.0.10/",
"username": ”IT_ops_master",
"apikey": “000"
}
},
ELSA Masters/Peers
Network Events Auth Events
IDS/AV/Firewall/
DNS
ELSA Peer 3
user: ops
apikey: 002
ELSA Peer 2
user: ops
apikey: 001
ELSA Peer 1
user: secops
apikey: 001
ELSA Master
SecOps
ELSA Master
IT Ops
elsa_node.conf – archive/log
limit
archive": {
# Uncomment to establish a retention period in days for archive logs
#”days”: 90,
“percentage”: 33,
“table_size”: 10000000
},
# Size limit in bytes for logs + index size. Set this to be 90-95% of your total data disk space.
# Size can also be specified as a percentage if the percent sign is included at the end (e.g. 95%).
"log_size_limit" : 200000000000,
#”log_size_limit” : “85%”,
archive – percent of log_size_limit to devote to archive
log_size_limit – the total disk limit ELSA will use
ELSA Forwarder
Network Events
Auth Events
IDS/AV/Firewall/
DNS
ELSA Peer 3
user: ops
apikey: 002
ELSA Peer 2
user: ops
apikey: 001
ELSA Peer 1
user: secops
apikey: 001
ELSA Master
SecOps
ELSA Master
IT Ops
ELSA Forwarder
user: ops
apikey: 001
WAN Events
elsa_node.conf – Forwarding
#"forwarding": {
# "forward_only": 1, # set to zero to both forward and index/archive
# "destinations": [
# { "method": "cp", "dir": "/mnt/nfs/central_server" },
# Example with password
# { "method": "scp", "user": "user", "password": "password", "port": 8022, "host":
"central.elsa.local", "dir": "/data/elsa/tmp/buffers" },
# Example using key
# { "method": "scp", "key_path": "/root/.ssh/id_rsa.pub", "host": "central.elsa.local",
"dir": "/data/elsa/tmp/buffers" }
# Example using URL forwarding
# { "method": "url", "url": "https://example.com/API/upload", "verify_mode": 0 }
# Example for an ops log server (logs about ELSA operations for sending multiple ELSA node logs to,
not the logs ELSA indexes)
# { "ops": 1, "method": "url", "https://opslogs.example.com/API/upload", "verify_mode": 1 }
# ]
#},
method – how/where to forward events
ops – ELSA instance receiving ops logs (node.log & web.log)
Under the Hood
Sphinx
Indexing
ELSA
Storage
ELSA
Buffers
ELSAEvents
syslog
ssl
(preformatted)
pattern_db
extract
raw text file
(buffers)
Index
(mysql)
Archive
(mysql)
Sphinx
temp index
(RAM)
perm index
(disk)
Event vs. Condition
• Event
– Action of an asset
– Time occurred
– Other stuff describing action:
• Source & Destination IPs
• Condition
– State of an asset
– Time of state snapshot
– Other stuff describing the state:
• Configuration data
Event and Condition
Enhancing IR Process
• Sample Workflow
1. Analyst sees bad thing happen in SO
2. Analyst digs deeper into
1. Other events that happened around same
time
2. Other behavior from involved assets
• Now it might be helpful to know a little
more about the condition of assets at
time closest to event happening
Event and Condition
Enhancing IR Process
• Helpful condition (configuration)
information
– Processes running
– Ports open
– Services listening
– Operating system
– Known software
– Known vulnerabilities
Where can I find this
information?
&
More importantly how
do I get this data into
ELSA for easy
correlation?
SO SecOps Sources
• PRADS – already integrated?
• Bro – now integrated
– Known Software
– Known Certs
– Known Hosts
• Port Scanners and Vulnerability Scanners
– Nmap
– Nikto
– Nessus
– OpenVAS
VAtoELSA.py
VA XML Data
Flatten
Syslog ELSA
MySQL
https://github.com/ChrisRimondi/va_to_elsa
$ python VAtoELSA.py –i report.nessus –r nessus –e
elsa_ip
$ python VAtoELSA.py –i report.xml –r openvas –e
elsa_ip
Putting it all together
Now lets get crazy
class=openvas host type="Web application
abuses” risk_factor=”High” groupby:dstip |
subsearch(class=bro_http uri:passwd
groupby:srcip)
In other words: Show me all source IP
addresses that requested a resource with
„passwd‟ in it where the server they
communicated with had a vulnerability
rated as high and of the type “Web
application abuses”.
One more time
class=nessus java risk_factor:critical
groupby:srcip | subsearch(class=bro_http
user_agent:java groupby:dstip, srcip) |
whois | filter(cc,us)
In other words: Tell me all of the sites
visited that had a country code captured
from whois not in the US and where the
client had a user agent string containing
java and a critically rated Java vulnerability
as discovered by Nessus.
Process Data
• Snapshots of processes at a particular
time
• Simple Python script that uses WMI to
collect process information, convert to
syslog and send to ELSA
• Collections information on each process
– Operating System
– PID
– Parent PID
– Process Name
– Creation time
– Source IP
Currently executing Java processes
Something is amiss…
What I have learned from
building lots of parsers
• Familiarize yourself with existing fields
and classes in ELSA:
– mysql> use syslog; select * from classes;
select * from fields;
• Reuse instead of building new
• Think about IR process:
– How can I link this log type to other log
types?
– What would I want to filter on?
New Content
Parsers
• bro_ftp
• bro_weird
• bro_tunnel
• bro_software
• bro_ssh
• bro_irc
• bro_syslog
• capture_loss
• known_certs
• known_hosts
• known_services
VA Integration
• Nessus
• Nikto
• OpenVAS
• Nmap
Dashboards
• Network Hunting
• Host Hunting
• SO Overview
• SSL
• SSH
• FTP
• SMTP
Dashboards
Eyeing the Onion
Eyeing the Onion
Eyeing the Onion
Eyeing the Onion
Eyeing the Onion

More Related Content

What's hot

Real-time data analysis using ELK
Real-time data analysis using ELKReal-time data analysis using ELK
Real-time data analysis using ELK
Jettro Coenradie
 
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ BehaviourWAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
Soroush Dalili
 
Drupal and Elasticsearch
Drupal and ElasticsearchDrupal and Elasticsearch
Drupal and Elasticsearch
Nikolay Ignatov
 
Designing a beautiful REST json api
Designing a beautiful REST json apiDesigning a beautiful REST json api
Designing a beautiful REST json api
0x07de
 
Apache Solr/Lucene Internals by Anatoliy Sokolenko
Apache Solr/Lucene Internals  by Anatoliy SokolenkoApache Solr/Lucene Internals  by Anatoliy Sokolenko
Apache Solr/Lucene Internals by Anatoliy Sokolenko
Provectus
 
Solr Indexing and Analysis Tricks
Solr Indexing and Analysis TricksSolr Indexing and Analysis Tricks
Solr Indexing and Analysis Tricks
Erik Hatcher
 
Introduction to Apache Solr
Introduction to Apache SolrIntroduction to Apache Solr
Introduction to Apache Solr
Alexandre Rafalovitch
 
Introduction to Solr
Introduction to SolrIntroduction to Solr
Introduction to SolrErik Hatcher
 
Drupal 8 + Elasticsearch + Docker
Drupal 8 + Elasticsearch + DockerDrupal 8 + Elasticsearch + Docker
Drupal 8 + Elasticsearch + Docker
Roald Umandal
 
Apache Solr - An Experience Report
Apache Solr - An Experience ReportApache Solr - An Experience Report
Apache Solr - An Experience Report
Netcetera
 
Elastic search apache_solr
Elastic search apache_solrElastic search apache_solr
Elastic search apache_solrmacrochen
 
GateKeeper - bypass or not bypass?
GateKeeper - bypass or not bypass?GateKeeper - bypass or not bypass?
GateKeeper - bypass or not bypass?
Csaba Fitzl
 
it's just search
it's just searchit's just search
it's just search
Erik Hatcher
 
Intro to Apache Lucene and Solr
Intro to Apache Lucene and SolrIntro to Apache Lucene and Solr
Intro to Apache Lucene and Solr
Grant Ingersoll
 
Hue: Big Data Web applications for Interactive Hadoop at Big Data Spain 2014
Hue: Big Data Web applications for Interactive Hadoop at Big Data Spain 2014Hue: Big Data Web applications for Interactive Hadoop at Big Data Spain 2014
Hue: Big Data Web applications for Interactive Hadoop at Big Data Spain 2014
gethue
 
SF Solr Meetup - Interactively Search and Visualize Your Big Data
SF Solr Meetup - Interactively Search and Visualize Your Big DataSF Solr Meetup - Interactively Search and Visualize Your Big Data
SF Solr Meetup - Interactively Search and Visualize Your Big Data
gethue
 
A Survey of Elasticsearch Usage
A Survey of Elasticsearch UsageA Survey of Elasticsearch Usage
A Survey of Elasticsearch Usage
Greg Brown
 
Voldemortの紹介
Voldemortの紹介Voldemortの紹介
Voldemortの紹介
Yoshiyasu SAEKI
 
ELUNA2014: Developing and Testing an open source web application
ELUNA2014: Developing and Testing an open source web applicationELUNA2014: Developing and Testing an open source web application
ELUNA2014: Developing and Testing an open source web application
Michael Cummings
 

What's hot (20)

Real-time data analysis using ELK
Real-time data analysis using ELKReal-time data analysis using ELK
Real-time data analysis using ELK
 
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ BehaviourWAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
 
Drupal and Elasticsearch
Drupal and ElasticsearchDrupal and Elasticsearch
Drupal and Elasticsearch
 
Designing a beautiful REST json api
Designing a beautiful REST json apiDesigning a beautiful REST json api
Designing a beautiful REST json api
 
Apache Solr/Lucene Internals by Anatoliy Sokolenko
Apache Solr/Lucene Internals  by Anatoliy SokolenkoApache Solr/Lucene Internals  by Anatoliy Sokolenko
Apache Solr/Lucene Internals by Anatoliy Sokolenko
 
Solr Indexing and Analysis Tricks
Solr Indexing and Analysis TricksSolr Indexing and Analysis Tricks
Solr Indexing and Analysis Tricks
 
Introduction to Apache Solr
Introduction to Apache SolrIntroduction to Apache Solr
Introduction to Apache Solr
 
Solr Flair
Solr FlairSolr Flair
Solr Flair
 
Introduction to Solr
Introduction to SolrIntroduction to Solr
Introduction to Solr
 
Drupal 8 + Elasticsearch + Docker
Drupal 8 + Elasticsearch + DockerDrupal 8 + Elasticsearch + Docker
Drupal 8 + Elasticsearch + Docker
 
Apache Solr - An Experience Report
Apache Solr - An Experience ReportApache Solr - An Experience Report
Apache Solr - An Experience Report
 
Elastic search apache_solr
Elastic search apache_solrElastic search apache_solr
Elastic search apache_solr
 
GateKeeper - bypass or not bypass?
GateKeeper - bypass or not bypass?GateKeeper - bypass or not bypass?
GateKeeper - bypass or not bypass?
 
it's just search
it's just searchit's just search
it's just search
 
Intro to Apache Lucene and Solr
Intro to Apache Lucene and SolrIntro to Apache Lucene and Solr
Intro to Apache Lucene and Solr
 
Hue: Big Data Web applications for Interactive Hadoop at Big Data Spain 2014
Hue: Big Data Web applications for Interactive Hadoop at Big Data Spain 2014Hue: Big Data Web applications for Interactive Hadoop at Big Data Spain 2014
Hue: Big Data Web applications for Interactive Hadoop at Big Data Spain 2014
 
SF Solr Meetup - Interactively Search and Visualize Your Big Data
SF Solr Meetup - Interactively Search and Visualize Your Big DataSF Solr Meetup - Interactively Search and Visualize Your Big Data
SF Solr Meetup - Interactively Search and Visualize Your Big Data
 
A Survey of Elasticsearch Usage
A Survey of Elasticsearch UsageA Survey of Elasticsearch Usage
A Survey of Elasticsearch Usage
 
Voldemortの紹介
Voldemortの紹介Voldemortの紹介
Voldemortの紹介
 
ELUNA2014: Developing and Testing an open source web application
ELUNA2014: Developing and Testing an open source web applicationELUNA2014: Developing and Testing an open source web application
ELUNA2014: Developing and Testing an open source web application
 

Viewers also liked

Wireless Investigations using Xplico
Wireless Investigations using XplicoWireless Investigations using Xplico
Wireless Investigations using Xplico
Chris Harrington
 
Giga vue hb1 event rolling presentation-final-1
Giga vue hb1 event rolling presentation-final-1Giga vue hb1 event rolling presentation-final-1
Giga vue hb1 event rolling presentation-final-1
Christopher Lee
 
Security Onion: peeling back the layers of your network in minutes
Security Onion: peeling back the layers of your network in minutesSecurity Onion: peeling back the layers of your network in minutes
Security Onion: peeling back the layers of your network in minutesbsidesaugusta
 
Gigamon 1Q15 Investor Relations Presentation
Gigamon 1Q15 Investor Relations PresentationGigamon 1Q15 Investor Relations Presentation
Gigamon 1Q15 Investor Relations Presentation
InvestorRelations
 
Detecting Malicious SSL Certificates Using Bro
Detecting Malicious SSL Certificates Using BroDetecting Malicious SSL Certificates Using Bro
Detecting Malicious SSL Certificates Using Bro
Andrew Beard
 
Optimizing your google local listing for search
Optimizing your google local listing for searchOptimizing your google local listing for search
Optimizing your google local listing for searchWebFX
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
patmisasi
 
Harnessing the Power of Metadata for Security
Harnessing the Power of Metadata for SecurityHarnessing the Power of Metadata for Security
Harnessing the Power of Metadata for Security
John Pollack
 

Viewers also liked (8)

Wireless Investigations using Xplico
Wireless Investigations using XplicoWireless Investigations using Xplico
Wireless Investigations using Xplico
 
Giga vue hb1 event rolling presentation-final-1
Giga vue hb1 event rolling presentation-final-1Giga vue hb1 event rolling presentation-final-1
Giga vue hb1 event rolling presentation-final-1
 
Security Onion: peeling back the layers of your network in minutes
Security Onion: peeling back the layers of your network in minutesSecurity Onion: peeling back the layers of your network in minutes
Security Onion: peeling back the layers of your network in minutes
 
Gigamon 1Q15 Investor Relations Presentation
Gigamon 1Q15 Investor Relations PresentationGigamon 1Q15 Investor Relations Presentation
Gigamon 1Q15 Investor Relations Presentation
 
Detecting Malicious SSL Certificates Using Bro
Detecting Malicious SSL Certificates Using BroDetecting Malicious SSL Certificates Using Bro
Detecting Malicious SSL Certificates Using Bro
 
Optimizing your google local listing for search
Optimizing your google local listing for searchOptimizing your google local listing for search
Optimizing your google local listing for search
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Harnessing the Power of Metadata for Security
Harnessing the Power of Metadata for SecurityHarnessing the Power of Metadata for Security
Harnessing the Power of Metadata for Security
 

Similar to Eyeing the Onion

Secure Streaming-as-a-Service with Kafka/Spark/Flink in Hopsworks
Secure Streaming-as-a-Service with Kafka/Spark/Flink in HopsworksSecure Streaming-as-a-Service with Kafka/Spark/Flink in Hopsworks
Secure Streaming-as-a-Service with Kafka/Spark/Flink in Hopsworks
Theofilos Kakantousis
 
Hopsworks Secure Streaming as-a-service with Kafka Flinkspark - Theofilos Kak...
Hopsworks Secure Streaming as-a-service with Kafka Flinkspark - Theofilos Kak...Hopsworks Secure Streaming as-a-service with Kafka Flinkspark - Theofilos Kak...
Hopsworks Secure Streaming as-a-service with Kafka Flinkspark - Theofilos Kak...
Evention
 
How ElasticSearch lives in my DevOps life
How ElasticSearch lives in my DevOps lifeHow ElasticSearch lives in my DevOps life
How ElasticSearch lives in my DevOps life琛琳 饶
 
Managing Your Security Logs with Elasticsearch
Managing Your Security Logs with ElasticsearchManaging Your Security Logs with Elasticsearch
Managing Your Security Logs with Elasticsearch
Vic Hargrave
 
Amazon Web Services Security
Amazon Web Services SecurityAmazon Web Services Security
Amazon Web Services Security
Jason Chan
 
Elastic search intro-@lamper
Elastic search intro-@lamperElastic search intro-@lamper
Elastic search intro-@lamper
medcl
 
曾勇 Elastic search-intro
曾勇 Elastic search-intro曾勇 Elastic search-intro
曾勇 Elastic search-intro
Shaoning Pan
 
2.28.17 Introducing DSpace 7 Webinar Slides
2.28.17 Introducing DSpace 7 Webinar Slides2.28.17 Introducing DSpace 7 Webinar Slides
2.28.17 Introducing DSpace 7 Webinar Slides
DuraSpace
 
Building APIs in an easy way using API Platform
Building APIs in an easy way using API PlatformBuilding APIs in an easy way using API Platform
Building APIs in an easy way using API Platform
Antonio Peric-Mazar
 
Spark summit-east-dowling-feb2017-full
Spark summit-east-dowling-feb2017-fullSpark summit-east-dowling-feb2017-full
Spark summit-east-dowling-feb2017-full
Jim Dowling
 
Spark-Streaming-as-a-Service with Kafka and YARN: Spark Summit East talk by J...
Spark-Streaming-as-a-Service with Kafka and YARN: Spark Summit East talk by J...Spark-Streaming-as-a-Service with Kafka and YARN: Spark Summit East talk by J...
Spark-Streaming-as-a-Service with Kafka and YARN: Spark Summit East talk by J...
Spark Summit
 
Frans Rosén Keynote at BSides Ahmedabad
Frans Rosén Keynote at BSides AhmedabadFrans Rosén Keynote at BSides Ahmedabad
Frans Rosén Keynote at BSides Ahmedabad
Security BSides Ahmedabad
 
REST easy with API Platform
REST easy with API PlatformREST easy with API Platform
REST easy with API Platform
Antonio Peric-Mazar
 
HashiConf Digital 2020: HashiCorp Vault configuration as code via HashiCorp T...
HashiConf Digital 2020: HashiCorp Vault configuration as code via HashiCorp T...HashiConf Digital 2020: HashiCorp Vault configuration as code via HashiCorp T...
HashiConf Digital 2020: HashiCorp Vault configuration as code via HashiCorp T...
Andrey Devyatkin
 
Just one-shade-of-openstack
Just one-shade-of-openstackJust one-shade-of-openstack
Just one-shade-of-openstack
Roberto Polli
 
Using Data Lakes
Using Data LakesUsing Data Lakes
Using Data Lakes
Amazon Web Services
 
Deployment and Management on AWS:
 A Deep Dive on Options and Tools
Deployment and Management on AWS:
 A Deep Dive on Options and ToolsDeployment and Management on AWS:
 A Deep Dive on Options and Tools
Deployment and Management on AWS:
 A Deep Dive on Options and Tools
Danilo Poccia
 
Slides
SlidesSlides
Slidesvti
 
Learning the basics of Apache NiFi for iot OSS Europe 2020
Learning the basics of Apache NiFi for iot OSS Europe 2020Learning the basics of Apache NiFi for iot OSS Europe 2020
Learning the basics of Apache NiFi for iot OSS Europe 2020
Timothy Spann
 
Logstash
LogstashLogstash
Logstash
琛琳 饶
 

Similar to Eyeing the Onion (20)

Secure Streaming-as-a-Service with Kafka/Spark/Flink in Hopsworks
Secure Streaming-as-a-Service with Kafka/Spark/Flink in HopsworksSecure Streaming-as-a-Service with Kafka/Spark/Flink in Hopsworks
Secure Streaming-as-a-Service with Kafka/Spark/Flink in Hopsworks
 
Hopsworks Secure Streaming as-a-service with Kafka Flinkspark - Theofilos Kak...
Hopsworks Secure Streaming as-a-service with Kafka Flinkspark - Theofilos Kak...Hopsworks Secure Streaming as-a-service with Kafka Flinkspark - Theofilos Kak...
Hopsworks Secure Streaming as-a-service with Kafka Flinkspark - Theofilos Kak...
 
How ElasticSearch lives in my DevOps life
How ElasticSearch lives in my DevOps lifeHow ElasticSearch lives in my DevOps life
How ElasticSearch lives in my DevOps life
 
Managing Your Security Logs with Elasticsearch
Managing Your Security Logs with ElasticsearchManaging Your Security Logs with Elasticsearch
Managing Your Security Logs with Elasticsearch
 
Amazon Web Services Security
Amazon Web Services SecurityAmazon Web Services Security
Amazon Web Services Security
 
Elastic search intro-@lamper
Elastic search intro-@lamperElastic search intro-@lamper
Elastic search intro-@lamper
 
曾勇 Elastic search-intro
曾勇 Elastic search-intro曾勇 Elastic search-intro
曾勇 Elastic search-intro
 
2.28.17 Introducing DSpace 7 Webinar Slides
2.28.17 Introducing DSpace 7 Webinar Slides2.28.17 Introducing DSpace 7 Webinar Slides
2.28.17 Introducing DSpace 7 Webinar Slides
 
Building APIs in an easy way using API Platform
Building APIs in an easy way using API PlatformBuilding APIs in an easy way using API Platform
Building APIs in an easy way using API Platform
 
Spark summit-east-dowling-feb2017-full
Spark summit-east-dowling-feb2017-fullSpark summit-east-dowling-feb2017-full
Spark summit-east-dowling-feb2017-full
 
Spark-Streaming-as-a-Service with Kafka and YARN: Spark Summit East talk by J...
Spark-Streaming-as-a-Service with Kafka and YARN: Spark Summit East talk by J...Spark-Streaming-as-a-Service with Kafka and YARN: Spark Summit East talk by J...
Spark-Streaming-as-a-Service with Kafka and YARN: Spark Summit East talk by J...
 
Frans Rosén Keynote at BSides Ahmedabad
Frans Rosén Keynote at BSides AhmedabadFrans Rosén Keynote at BSides Ahmedabad
Frans Rosén Keynote at BSides Ahmedabad
 
REST easy with API Platform
REST easy with API PlatformREST easy with API Platform
REST easy with API Platform
 
HashiConf Digital 2020: HashiCorp Vault configuration as code via HashiCorp T...
HashiConf Digital 2020: HashiCorp Vault configuration as code via HashiCorp T...HashiConf Digital 2020: HashiCorp Vault configuration as code via HashiCorp T...
HashiConf Digital 2020: HashiCorp Vault configuration as code via HashiCorp T...
 
Just one-shade-of-openstack
Just one-shade-of-openstackJust one-shade-of-openstack
Just one-shade-of-openstack
 
Using Data Lakes
Using Data LakesUsing Data Lakes
Using Data Lakes
 
Deployment and Management on AWS:
 A Deep Dive on Options and Tools
Deployment and Management on AWS:
 A Deep Dive on Options and ToolsDeployment and Management on AWS:
 A Deep Dive on Options and Tools
Deployment and Management on AWS:
 A Deep Dive on Options and Tools
 
Slides
SlidesSlides
Slides
 
Learning the basics of Apache NiFi for iot OSS Europe 2020
Learning the basics of Apache NiFi for iot OSS Europe 2020Learning the basics of Apache NiFi for iot OSS Europe 2020
Learning the basics of Apache NiFi for iot OSS Europe 2020
 
Logstash
LogstashLogstash
Logstash
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Eyeing the Onion

  • 1.
  • 2.
  • 3. Introductions • Brad Shoop - @bradshoop – http://eyeis.net – IT since mid-90s, security-focused since 2006 (GCIH GCFA) – Doc, testing and marketing contributor to Security Onion – Technical Editor, The Practice of NSM (a must read!) – Author Security Onion for Splunk apps – Currently work for Mandiant • Chris Rimondi - @crimondi - http://www.securitygrit.com/ – Father of three boys ages four and under • Including one < month old! – Former IT Director & Former Security Consultant – Now with Mandiant – ISSA Board Member Chattanooga
  • 4. Agenda • Big Data and Security Onion • Splunk vs ELSA • Splunk app • What is ELSA? - Architecture Overview • Integrating Conditional Data • Dashboards
  • 5. Security Onion Makes A Lot of Data ELSA Bro IDS Snort/Suricata OSSEC
  • 6. SecOps Needs More Data ELSA Firewalls Windows Syslog
  • 7. Splunk vs ELSA Splunk ELSA Google-style search Google-style search Event parsing Event parsing Custom visualization Basic visualization Custom dashboard capability Basic dashboard capability Fast (but not “ELSA fast”) Sub-second searches Multi-field groupbys Single field groupbys $$$ Open Source (GNU GPL v2)
  • 9. Learning with SO for Splunk • Learn the logs! • Follow the uid! • Understand how logged events relate across toolsets: – Bro – context & alerts – Snort/Suricata – alerts – OSSEC – alerts • Identify normal from anomalous
  • 10.
  • 11.
  • 12.
  • 13. Security Onion for Splunk Demo • Security Onion for Splunk – http://splunk-base.splunk.com/apps/45784/security-onion • Security Onion Server/Sensor Add-on – http://splunk-base.splunk.com/apps/52461/security-onion- serversensor-add-on
  • 15. ELSA WebAPI Architecture SO Sensor/ ELSA Peer or Forwarder SO Sensor/ ELSA Peer or Forwarder SO Sensor/ ELSA Peer or Forwarder SO Server/ ELSA Master Firewalls Sysloggers ELSA Forwarder Windows Network Network Network SSL Syslog/SSL SO Sensor ELSA as peer or forwarder. Peer mode: events indexed locally and queried remotely from the Master Forwarder mode: events are parsed, compressed, the n forwarded via SSL to Master node for indexing. Yes, it can do both!
  • 16.
  • 17. elsa_web.conf apikeys: username (“secops”) and apikey (“001”) for web API authentication peers: the local ELSA instance and ELSA Peers the instance has access to query. Standalone ELSA Master apikeys": { ”secops": ”001" }, "peers": { "127.0.0.1": { "url": "http://127.0.0.1/", "username": ”secops", "apikey": ”001" } }, ELSA Master with 1 Peer apikeys": { ”secops": ”001" }, "peers": { "127.0.0.1": { "url": "http://127.0.0.1/", "username": ”secops", "apikey": ”001" }, ”192.168.0.10": { "url": "http://192.168.0.10/", "username": ”IT_ops_master", "apikey": “000" } },
  • 18. ELSA Masters/Peers Network Events Auth Events IDS/AV/Firewall/ DNS ELSA Peer 3 user: ops apikey: 002 ELSA Peer 2 user: ops apikey: 001 ELSA Peer 1 user: secops apikey: 001 ELSA Master SecOps ELSA Master IT Ops
  • 19. elsa_node.conf – archive/log limit archive": { # Uncomment to establish a retention period in days for archive logs #”days”: 90, “percentage”: 33, “table_size”: 10000000 }, # Size limit in bytes for logs + index size. Set this to be 90-95% of your total data disk space. # Size can also be specified as a percentage if the percent sign is included at the end (e.g. 95%). "log_size_limit" : 200000000000, #”log_size_limit” : “85%”, archive – percent of log_size_limit to devote to archive log_size_limit – the total disk limit ELSA will use
  • 20. ELSA Forwarder Network Events Auth Events IDS/AV/Firewall/ DNS ELSA Peer 3 user: ops apikey: 002 ELSA Peer 2 user: ops apikey: 001 ELSA Peer 1 user: secops apikey: 001 ELSA Master SecOps ELSA Master IT Ops ELSA Forwarder user: ops apikey: 001 WAN Events
  • 21. elsa_node.conf – Forwarding #"forwarding": { # "forward_only": 1, # set to zero to both forward and index/archive # "destinations": [ # { "method": "cp", "dir": "/mnt/nfs/central_server" }, # Example with password # { "method": "scp", "user": "user", "password": "password", "port": 8022, "host": "central.elsa.local", "dir": "/data/elsa/tmp/buffers" }, # Example using key # { "method": "scp", "key_path": "/root/.ssh/id_rsa.pub", "host": "central.elsa.local", "dir": "/data/elsa/tmp/buffers" } # Example using URL forwarding # { "method": "url", "url": "https://example.com/API/upload", "verify_mode": 0 } # Example for an ops log server (logs about ELSA operations for sending multiple ELSA node logs to, not the logs ELSA indexes) # { "ops": 1, "method": "url", "https://opslogs.example.com/API/upload", "verify_mode": 1 } # ] #}, method – how/where to forward events ops – ELSA instance receiving ops logs (node.log & web.log)
  • 22. Under the Hood Sphinx Indexing ELSA Storage ELSA Buffers ELSAEvents syslog ssl (preformatted) pattern_db extract raw text file (buffers) Index (mysql) Archive (mysql) Sphinx temp index (RAM) perm index (disk)
  • 23. Event vs. Condition • Event – Action of an asset – Time occurred – Other stuff describing action: • Source & Destination IPs • Condition – State of an asset – Time of state snapshot – Other stuff describing the state: • Configuration data
  • 24. Event and Condition Enhancing IR Process • Sample Workflow 1. Analyst sees bad thing happen in SO 2. Analyst digs deeper into 1. Other events that happened around same time 2. Other behavior from involved assets • Now it might be helpful to know a little more about the condition of assets at time closest to event happening
  • 25. Event and Condition Enhancing IR Process • Helpful condition (configuration) information – Processes running – Ports open – Services listening – Operating system – Known software – Known vulnerabilities
  • 26. Where can I find this information? & More importantly how do I get this data into ELSA for easy correlation?
  • 27. SO SecOps Sources • PRADS – already integrated? • Bro – now integrated – Known Software – Known Certs – Known Hosts • Port Scanners and Vulnerability Scanners – Nmap – Nikto – Nessus – OpenVAS
  • 28. VAtoELSA.py VA XML Data Flatten Syslog ELSA MySQL https://github.com/ChrisRimondi/va_to_elsa
  • 29. $ python VAtoELSA.py –i report.nessus –r nessus –e elsa_ip
  • 30. $ python VAtoELSA.py –i report.xml –r openvas –e elsa_ip
  • 31. Putting it all together
  • 32. Now lets get crazy class=openvas host type="Web application abuses” risk_factor=”High” groupby:dstip | subsearch(class=bro_http uri:passwd groupby:srcip) In other words: Show me all source IP addresses that requested a resource with „passwd‟ in it where the server they communicated with had a vulnerability rated as high and of the type “Web application abuses”.
  • 33. One more time class=nessus java risk_factor:critical groupby:srcip | subsearch(class=bro_http user_agent:java groupby:dstip, srcip) | whois | filter(cc,us) In other words: Tell me all of the sites visited that had a country code captured from whois not in the US and where the client had a user agent string containing java and a critically rated Java vulnerability as discovered by Nessus.
  • 34. Process Data • Snapshots of processes at a particular time • Simple Python script that uses WMI to collect process information, convert to syslog and send to ELSA • Collections information on each process – Operating System – PID – Parent PID – Process Name – Creation time – Source IP
  • 37. What I have learned from building lots of parsers • Familiarize yourself with existing fields and classes in ELSA: – mysql> use syslog; select * from classes; select * from fields; • Reuse instead of building new • Think about IR process: – How can I link this log type to other log types? – What would I want to filter on?
  • 38. New Content Parsers • bro_ftp • bro_weird • bro_tunnel • bro_software • bro_ssh • bro_irc • bro_syslog • capture_loss • known_certs • known_hosts • known_services VA Integration • Nessus • Nikto • OpenVAS • Nmap Dashboards • Network Hunting • Host Hunting • SO Overview • SSL • SSH • FTP • SMTP

Editor's Notes

  1. Money, Speed, Looks