• We just launched and are currently in beta. Join us as we build and grow the community.

Advertise Here

Advertise Here

Advertise Here

Security Onion Configuration in VMware

loremipsum

Threat Hunter
L Rep
0
0
0
Rep
0
L Vouches
0
0
0
Vouches
0
Posts
189
Likes
169
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 2 900 XP
Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It’s based on Ubuntu and contains Snort, Suricata, Bro, OSSEC, Sguil, Squert, ELSA, Xplico, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!

Security Onion effortlessly merges collectively two main roles i.e. complete packet capture another Network-based [NIDS] and host-based intrusion detection systems [HIDS].

There is some Analysis tool are available that also work as a real-time program by capturing network packets.

NIDS: Snort or Suricata and Bro as network intrusion detection for fingerprints and identifiers that contest identified malicious, abnormal otherwise suspicious traffic.

HIDS: Security Onion offers OSSEC for host-based intrusion detection.

Sguil: It is the crucial Security Onion tool for network security analysts. Sguil’s main component is an intuitive GUI that gives access to real-time events, session data, and raw packet captures.

Squert: It is a web application that is used to query and view event data stored in a Sguil database.

ELSA: Enterprise Log Search and Archive is a three-tier log receiver, archiver, indexer, and web frontend for incoming syslog.

For more details visit here

Let’s start!!

Create VM for Security Onion installation

Open VMware, select option “creates new virtual machine”, now for install from wizard select second option:

Install the disc image file in order to browse the iso file of security onion.

Then click on next.

1.PNG


Now select 2nd option “Linux” for the guest operating system and select version “Ubuntu”. Then click on next and next as per your requirements.

2.PNG


Explore custom hardware for making the following changes:

Select bridges connection and enable the checkbox for replicate connection for network adapter setting. Similarly, add one more network adapter and also select bridges connection for the 2nd adapter

Then click on finish.

5.PNG


Installation

It will start booting the VM automatically, now for SECURITY ONION

6.PNG


At welcome screen; Select language and click “Continue”. Here we have chosen English as the preferred language.

7.PNG


Read the content and then click on “Continue”.

8.PNG


Choose the radio button for “Erase the disk and install Security Onion” to begin installation and click “Install Now”

9.PNG


Click on “Continue” then it will proceed for disk partitions.

10.PNG


Check your location, without holdup, select your time zone and then click on “Continue”.

12.PNG


Choose keyboard layout “English (US)” and then click on “Continue”.

13.PNG


Now create your profile by giving your detail as given below:

  • Enter your name: Ignite
  • Enter your computer’s name: Ignite-pc
  • Select a username: Ignite
  • Enter a password: 1234

Click “Continue”

14.PNG


Now it may take some time in installation, but after that when installation is complete. Click “Restart Now” for a new installation.

15.PNG


Security onion configuration 1st part

In order to configure security onion as a real-time system for NIDS and HIDS, we have divided configuration setting into two parts.

Now enter your username and password for login as shown in given below image.

16.PNG


At Desktop screen you have can see setup icon; click on “setup” icon for configuration of the network interface.

17.1.png


Configure 1st network adapter for the management interface

Click on “setup” icon present at the desktop to configure security onion on your system.

Click “Yes, Continue”

17.PNG


Click “Yes” to configure /etc/network/interface now as shown in given below image.

18.PNG


Choose eth0 as network interface should be the management interface as shown in given below image.

19.PNG


Choose Static addressing for eth0 utilization as shown in given below image.

20.PNG


Enter a static IP for your management interface as shown in the given image.

21.PNG


Enter subnet mask of for static addressing as shown in given below image.

22.PNG


Enter gateway as shown in given below image.

23.PNG


Enter DNS server IP it can be 192.168.1.1 or 8.8.8.8 or can be both separated by spaces.

25.PNG


Enter your local domain name as shown in given below image.

25.PNG


Configure 2nd network adapter for sniffing interface

Click “Yes” to configure sniffing interfaces now as shown in given below image.

26.PNG


Choose eth1 as network interface should be used for sniffing interface.

27.PNG


Given below image is showing brief details of a network interface configuration. Click yes to proceed further step.

28.PNG


Network configuration is completed now click “Yes Reboot”

29.PNG


Security onion configuration 2nd part

Now once it restarts, again click on “setup” icon for further configuration of security onion setup as a real-time machine. Then click “yes, Continue”.

30.PNG


Since we had already configured the network interface, therefore, click on “yes, Skip network configuration”

31.PNG


Select “Stable setup” which will configure ELSA; then Click OK.

32.PNG


Select “Evaluation Mode” which configure Snort and Bro to monitor one network interface; then Click OK

33.PNG


Select eth1 for the 2nd network interface that should be monitored as shown in the given image.

34.PNG


Now add a username for Sguil, Squert, and ELSA a shown in given below image.

35.PNG


Enter the password for username used while you want to login into Sguil, Squert and ELSA a shown in given below image.

36.PNG


Now again next dialog box will display brief detain for configuration setting. Click on “yes, proceed with changes”

38.PNG


Here it will proceed for stopping all NSM services which manage all network services from creation to deletion.

39.PNG


Security Onion configuration is now completed. You will see it will launch icon for SGUIL, Squert, and ELSA. Now click on the squil icon and then enter the username and password to login into sguil.

45.PNG


Select network eth1 to be the monitor as shown in given below image and click on “start SGUIL”

46.PNG


It will work as a real-time system and start capturing traffic as shown in given below image.

Great!! Now analysis your network traffic will real-time machine

47.PNG


Author: Sanjeet Kumar is an Information Security Analyst | Pentester | Researcher Contact Here
 

452,498

347,867

347,876

Top