ThreatHunting
sysmon-config
ThreatHunting | sysmon-config | |
---|---|---|
1 | 35 | |
564 | 4,768 | |
- | - | |
4.2 | 0.0 | |
about 1 year ago | 3 months ago | |
YARA | ||
GNU General Public License v3.0 only | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ThreatHunting
sysmon-config
-
Software Hardening Tools for System Defense
cd c:\sysmon git clone https://github.com/SwiftOnSecurity/sysmon-config sysmon -accepteula -i sysmon-config/sysmon-config.xml
-
Troubleshooting Intermittent Slowness on Network Share
https://learn.microsoft.com/en-us/troubleshoot/windows-client/networking/networking-overview plenty of windows troubleshooting tips here too, and this is pretty good symon script saves to event viewer even after a reboot! , also care with wireshark as it may give you a false sense of there's a fault, try tcpIPview from sysinternals and yeah procmon for sure. https://github.com/SwiftOnSecurity/sysmon-config use psping to ping the server directly and see the latency goes up and down, you can ping it more often every 1 second so you get a better more detailed resul.
-
Sysmon not reading our config.xml-file
Rebooted and downloaded sysmon 14.16 and sysmonconfig-export.xml
-
Cheap, Fast, Good and Simple Remote Monitoring for Small Environments
There's all sorts of things you can do for various types of monitoring including Zabbix, Graylog, roll-your-own with Sysmon (see https://github.com/SwiftOnSecurity/sysmon-config), etc. The question becomes one of time - don't get so focused on DIY or free that you spend hours (or pay someone to spend hours) a month babysitting.
-
How do you actually threat hunt?
If you don't catch it what changes can you do to your logging to enable it? Can you push it out to the environment? While sysmon is awesome, you can do your hunts with built in logging most of the time... Just might not have all the data around it you want to have. I would throw sysmon on a test box (make sure you have a config file that filters out the noise: https://github.com/SwiftOnSecurity/sysmon-config)
-
How do I exclude specific event IDs in Sysmon?
I played around with https://github.com/SwiftOnSecurity/sysmon-config Maybe there xml can point you in the right direction
-
Finding the Process initiating a ping
and here's an off the shelf config file: https://github.com/SwiftOnSecurity/sysmon-config
- How to filter SysMon Logs for suspicious events
- SysMon Deployment Help
-
MISP integration issues
- Make sure you have sysmon installed on the agent host and it is logging event to the Sysmon folder as ID 22. Can use this xml file
What are some alternatives?
signature-base - YARA signature and IOC database for my scanners and tools
sysmon-modular - A repository of sysmon configuration modules
MISP - MISP (core software) - Open Source Threat Intelligence and Sharing Platform
sigma - Main Sigma Rule Repository
PetitPotam - PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
ansible-role-elasticsearch - Ansible Role - Elasticsearch
SysmonTools - Utilities for Sysmon
vscode-sysmon - Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.
SysmonForLinux
SysmonConfigPusher - Pushes Sysmon Configs
Event-Forwarding-Guidance - Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsacyber
google-cloud-ops-agents-ansible - Ansible Role for Google Cloud Ops