auditd
TheHive
auditd | TheHive | |
---|---|---|
9 | 24 | |
1,364 | 3,166 | |
- | 0.0% | |
5.8 | 0.0 | |
13 days ago | over 1 year ago | |
Scala | ||
Apache License 2.0 | GNU Affero General Public License v3.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
auditd
-
The Linux Process Journey - “kauditd”
Lastly, by using the “Linux Auditing System” the system administrator can investigate what happens in the system for the purpose of debugging or in case of a security incident. We can also use the “auditctl” utility get/add/delete rules as part of Linux's kernel audit system (https://linux.die.net/man/8/auditctl). Also, there are great examples for “audit.rules” in GitHub (one example is https://github.com/Neo23x0/auditd/blob/master/audit.rules).
-
Looking for inputs and validation for this network setup.
2) There are many opensource solutions, and you hit on all the important ones. Think creativitly, and test all your controls. hit your boxes with Metaspoilt and atomic redteam. These tools will help you verify that you have the proper controls in place, and that you are able to detect attacks (successful, and failed). Run auditd with Florian Roth's rule set on your linux boxes (https://github.com/Neo23x0/auditd/blob/master/audit.rules ), and sysmon (https://github.com/olafhartong/sysmon-modular) on windows.
-
Top 5 logs to ingest into Splunk
Linux: AuditD with customized configurations script for your environment
-
help needed: auditd rules for general purpose vps
However, the auditd repo from Florian Roth is like a golden standard for auditd config.
- How to forward syslog event related to CMDs done by none root user
- New blue team
-
Alerts Log Broken
Enabled auditd - with the rules from - https://github.com/Neo23x0/auditd
-
Splunk App for Unix and Linux
I don't think that the addon can do this for you. But, as a good start, check out Florian Roths auditd config (https://github.com/Neo23x0/auditd).
- Sysmon on Linux
TheHive
-
What are your go-to tools for task management and/or case work?
I had a quick test with the hive looks pretty nice. https://thehive-project.org/
-
Taking Notes: What are your techniques as security professionals?
Also look into hive. Lots of people are moving that direction. https://thehive-project.org/
-
Free Tech Tools and Resources - Connection Tracing, Throttling Tool, Log Search & More
TheHive is a versatile open-source solution for streamlining the investigation and prompt handling of security incidents. Seamlessly integrates with MISP to facilitate the transition from event analysis to investigation initiation, enabling efficient synchronization and export for collaborative threat detection and response. Moreover, coupling TheHive with Cortex empowers security professionals to efficiently analyze up to hundreds of observables. Timely-Lychee-5204 describes it as, "an open-source and scalable Security Incident Response Platform designed for handling incidents efficiently."
-
Monthly Security Checklist
TheHive/Cortex - https://thehive-project.org/
- Does anyone have experience with self-hosted endpoint security solutions?
-
Software for recording security incidents?
i recommend TheHive for creating incident tickets. it is opensource but there is paid one offered by StrangeBee
-
Warning: Do not use Hive Social
Also unrelated to TheHive project, a security incident response tool.
https://thehive-project.org/
- New blue team
- 22 OSINT service for vulnerability detection that can be utilized in IT security.
-
Incident Response: What tool workflow do you use to collaborate on and document IR?
I haven't done any IR myself, but I was thinking something like TheHive Project (open source) or similar proprietary IR toolsets would be common. But over on r/blueteamsec I just saw this post, where people claimed to be using:
What are some alternatives?
sysmon-modular - A repository of sysmon configuration modules
Aurora-Incident-Response - Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders
velociraptor - Digging Deeper....
laurel - Transform Linux Audit logs for SIEM usage
grr - GRR Rapid Response: remote live forensics for incident response
PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
RedEye - RedEye is a visual analytic tool supporting Red & Blue Team operations
dislocker - FUSE driver to read/write Windows' BitLocker-ed volumes under Linux / Mac OSX
AtomicPurpleTeam - Atomic Purple Team Framework and Lifecycle
Kuiper - Digital Forensics Investigation Platform