Automate OSQUERY with Wazuh - Let's Build A Host Intrusion Detection System

  Рет қаралды 9,390

Taylor Walton

Taylor Walton

Күн бұрын

Пікірлер
@kennethshibaba4490
@kennethshibaba4490 Жыл бұрын
Hi Taylor. Great video. Did you install osquery in your server or agent device? Forgive the question.
@iain_grant
@iain_grant Жыл бұрын
Great vid - helps me understand where to place osquery as Wazuh isn't that clear on that.
@jasonyeung2498
@jasonyeung2498 3 жыл бұрын
Might I ask if I can put the osquery.conf into /var/ossec/etc/shared/ so that, for example in Windows, I can pull the conf file back at C:\Program Files (x86)\ossec-agent\shared\osquery.conf? Is it one way to do the remote deployment for osquery?
@taylorwalton1388
@taylorwalton1388 3 жыл бұрын
Hey Jason, unfortunately no. The /var/ossec/etc/shared directory contains parameters that also belong in the ossec.conf. This allows you to setup log collection, FIM directories, wodle modules, etc. and apply these settings to all wazuh agents in the group. To mass deploy the osquery.conf you could use Ansible, Chef or another remote deployment tool of your choice. Hope that helps and thanks for watching!
@LiamPaul-p3n
@LiamPaul-p3n 11 ай бұрын
What could be causing nothing in wazuh to be showing up in the dashboard like yours does. I followed the video and cant seem to get any events in wazuh
@tomsgrinbergs8020
@tomsgrinbergs8020 3 жыл бұрын
Little bit off topic here.. Wondering if there is a network flow(not cisco's netflow) tool that can be installed in a home lab setting and then integrated into Wazuh?
@taylorwalton_socfortress
@taylorwalton_socfortress 3 жыл бұрын
Hey Tom, Are you interested in monitoring network traffic, with something like an IDS/IPS device? If so, I really enjoy an Open Source tool called, Suricata. It can be set inline or receive packets via a span port. These results detail network flows as well as any network related events such as traffic to a command and control server, web application attacks, IP reputation and more. This tool integrates very well with Wazuh and ELK. I plan on covering Suricata and integrating it with Wazuh in future videos, but feel free to explore on your own! suricata.readthedocs.io/en/latest/what-is-suricata.html Thanks for watching!
@tomsgrinbergs8020
@tomsgrinbergs8020 3 жыл бұрын
@@taylorwalton_socfortress Thanks, yes I've been looking into Suricata. I'm struggling with aggregating the bytes sent and received, so essentially the sum of the below: data.flow.bytes_toclient data.flow.bytes_toserver It appears that these are strings and thus don't show under "Significant Terms" when "Sum" is selected within visualizations thus I'm not able to see the total or bytes sent and received between 2 IP addresses. I'm now wondering how to use Jupyter-Notebook to do this, but I think that's a big stretch. Anyhow, will wait for your video on Suricata in future, thanks for making this content - I really enjoy it!
@pierreyoboue5473
@pierreyoboue5473 Жыл бұрын
Hi, thanks for all. I have a request, can i have your config and flag files? i want deploy on windows and i have some problem with these files
@anhuc2824
@anhuc2824 3 жыл бұрын
Hi, i have fleet server to manage all agent osquery, and file: osquery_result of all server locate at fleet server, how do i add log osquery_result to wazuh . Thanks
@taylorwalton_socfortress
@taylorwalton_socfortress 3 жыл бұрын
If the osquery_result is being json outputted, install a wazuh_agent onto the fleet server and edit the ossec.conf file to contain this block /path/to/osquery_result json Hope that helps and thanks for watching!
@pierreyoboue5473
@pierreyoboue5473 Жыл бұрын
@@taylorwalton_socfortress but how know the format ?
@8eck
@8eck Жыл бұрын
Automated installation of osquery would be more interesting...
@JayapradhaP-u2j
@JayapradhaP-u2j Жыл бұрын
W0706 18:03:09.135244 2388 options.cpp:106] The CLI only flag --logger_plugin set via config file will be ignored, please use a flagfile or pass it to the process at startup im facing this login on my custom query but packs works fine
The evil clown plays a prank on the angel
00:39
超人夫妇
Рет қаралды 53 МЛН
Beat Ronaldo, Win $1,000,000
22:45
MrBeast
Рет қаралды 158 МЛН
Don’t Choose The Wrong Box 😱
00:41
Topper Guild
Рет қаралды 62 МЛН
TryHackMe! Finding Computer Artifacts with osquery
20:04
John Hammond
Рет қаралды 34 М.
Threat Detection & Active Response With Wazuh
45:56
HackerSploit
Рет қаралды 109 М.
The Malware that hacked Linus Tech Tips
10:13
PC Security Channel
Рет қаралды 1,6 МЛН
Network Intrusion Detection with Suricata
16:46
Pro Tech Show
Рет қаралды 22 М.
DFIR Summit 2016: Incident Detection and Hunting at Scale: An Introduction to Osquery
25:44
SANS Digital Forensics and Incident Response
Рет қаралды 4,6 М.
The evil clown plays a prank on the angel
00:39
超人夫妇
Рет қаралды 53 МЛН