{"id":971,"date":"2012-06-08T08:54:10","date_gmt":"2012-06-08T13:54:10","guid":{"rendered":"http:\/\/it.thelibrarie.com\/weblog\/?p=971"},"modified":"2016-06-27T09:26:05","modified_gmt":"2016-06-27T14:26:05","slug":"security-onion","status":"publish","type":"post","link":"https:\/\/it.thelibrarie.com\/weblog\/2012\/06\/security-onion\/","title":{"rendered":"Security Onion"},"content":{"rendered":"<p>After reading some more sans security documents I was pointed toward Security Onion as my go-to for IDS\/IPS.  I had been using snorby TKL by smooth-sec (Bailey.st),  but it wasn&#8217;t doing a great job and the documentation was lacking.  Security onion is more of a resource hog but offers quite a few awesome tools.  Here is my basic setup to get Security Onion working properly:<\/p>\n<p>Download ISO, burn, Install on a server (Dell PE1850, 2x 2.8GHz Xeon, 16GB RAM, Mirror 300GB SCSI)<\/p>\n<p>Added Root User &#8211;  I still dislike all this &#8220;sudo this&#8221; and &#8220;sudo that&#8221;<br \/>\n<code>sudo passwd root<\/code><\/p>\n<p>Update Operating system<br \/>\n<code>apt-get update<\/code><br \/>\n<code>apt-get upgrade<\/code><\/p>\n<p>Update Onion<br \/>\n<code>sudo -i \"curl -L http:\/\/sourceforge.net\/projects\/security-onion\/files\/security-onion-upgrade.sh > ~\/security-onion-upgrade.sh && bash ~\/security-onion-upgrade.sh\"<\/code><\/p>\n<p>Turn off sensor for Eth1 (assuming Eth0 is mirror port and Eth1 is LAN)<br \/>\n<code>nsm_sensor_ps-stop --sensor-name=YOURSERVERNAME-eth1<\/code><br \/>\n<code>nano \/etc\/nsm\/sensortab<\/code><br \/>\nComment out the Interface to disable<\/p>\n<p>Reboot<br \/>\n<code>reboot<\/code><\/p>\n<p>Remove SIDs\/Block Addresses (*OLD*)<br \/>\nBlock SIDs will stop snort from even reporting the issue &#8211; by default ALL rules are enabled<br \/>\n<code>nano \/etc\/pulledpork\/disablesid.conf<\/code><\/p>\n<blockquote><p>1:1411-1:1419,1:OTHERRULES,1:ETC<\/p><\/blockquote>\n<p><code>\/usr\/local\/bin\/pulledpork_update.sh<\/code><br \/>\n<code>nsm_sensor_ps-stop<\/code><br \/>\n<code>nsm_sensor_ps-start<\/code><\/p>\n<p>Remove SIDs\/Block Addresses (*NEW*)<br \/>\nBlock SIDs will stop snort from even reporting the issue &#8211; by default ALL rules are enabled<br \/>\n<code>nano \/etc\/nsm\/pulledpork\/disablesid.conf<\/code><\/p>\n<blockquote><p>1:1411-1:1419,1:OTHERRULES,1:ETC<\/p><\/blockquote>\n<p><code>\/usr\/bin\/rule-update<\/code><br \/>\n<code>nsm_sensor_ps-stop<\/code><br \/>\n<code>nsm_sensor_ps-start<\/code><\/p>\n<p>Blocking IPs will stop snort from worrying about certain hosts &#8211; by default ALL hosts are worried<br \/>\n<code>nano \/etc\/nsm\/YOURSERVERNAME-eth1\/bpf.conf<\/code><\/p>\n<p>Add the following template:<\/p>\n<blockquote><p>#Nothing from src host to dst port<br \/>\n!(src host xxx.xxx.xxx.xxx &#038;&#038; dst port 161) &#038;&#038;<br \/>\n#Nothing from src host to dst host and dst port<br \/>\n!(src host xxx.xxx.xxx.xxx &#038;&#038; dst host xxx.xxx.xxx.xxx &#038;&#038; dst port 80) &#038;&#038;<br \/>\n#Nothing to or from:<br \/>\n!(host xxx.xxx.xxx.xxx) &#038;&#038;<br \/>\n#Last entry has no final &#038;&#038;<br \/>\n!(host xxx.xxx.xxx.xxx)<\/p><\/blockquote>\n<p><code>nsm_sensor_ps-restart<\/code><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After reading some more sans security documents I was pointed toward Security Onion as my go-to for IDS\/IPS. I had been using snorby TKL by smooth-sec (Bailey.st), but it wasn&#8217;t doing a great job and the documentation was lacking. Security onion is more of a resource hog but offers quite a few awesome tools. Here &hellip; <a href=\"https:\/\/it.thelibrarie.com\/weblog\/2012\/06\/security-onion\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Security Onion<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,4],"tags":[],"class_list":["post-971","post","type-post","status-publish","format-standard","hentry","category-linux","category-networking"],"_links":{"self":[{"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/posts\/971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/comments?post=971"}],"version-history":[{"count":3,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/posts\/971\/revisions"}],"predecessor-version":[{"id":1311,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/posts\/971\/revisions\/1311"}],"wp:attachment":[{"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/media?parent=971"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/categories?post=971"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/tags?post=971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}