Actively Blocking Attackers with Wazuh - Let's Deploy a Host Intrusion Detection System #7

  Рет қаралды 21,373

Taylor Walton

Taylor Walton

Күн бұрын

Join me as we configure Wazuh's active defense feature that allows us to actively block attackers without the need of human interaction. Let's deploy a Host Intrusion Detection System and SIEM with free open source tools. Join me as we explore and learn together.
Check us out: www.opensecure.co/
Interact with our demo: www.opensecure.co/demo
Hire us: www.opensecure.co/contact-us

Пікірлер: 39
@RozzClips
@RozzClips 9 ай бұрын
Thanks for sharing. So far, you're the best when providing advanced topics into Wazuh.
@RuneFToftlund
@RuneFToftlund Ай бұрын
Thanks for the video.
@Leezaardd
@Leezaardd 2 жыл бұрын
Great video, everything is so well explained!
@kabyg424
@kabyg424 2 жыл бұрын
This channel as gold mine with me , tks you. Keep it up 🥰
@munjurhasan9778
@munjurhasan9778 2 жыл бұрын
great video boss...i have been following your channel and watched almost all the videos...carry on
@SimoneBacciglieriAS
@SimoneBacciglieriAS 2 жыл бұрын
Thanks for this video. Just one note: in the wazuh's config file the two Google's DNS are in white list because they are the DNS of the server where wazuh is running. If they for some reason are banned the server will stop working.
@yassine4855
@yassine4855 3 жыл бұрын
Great video thanks, if you can do more videos about active response like blocking accounts or maybe locking down hosts that would be very appreciated !!
@taylorwalton_socfortress
@taylorwalton_socfortress 3 жыл бұрын
Hey Yassin, thank you for watching! Sure, I will make a part two to the active response feature. Stay tuned!
@taylorwalton_socfortress
@taylorwalton_socfortress 3 жыл бұрын
Hey Yassin, check out the new video which covers blocking user accounts with active response! kzfaq.info/get/bejne/sLmGf5p52LKrhJs.html&ab_channel=OpenSecure Thanks for watching and let me know what you think!
@yassine4855
@yassine4855 3 жыл бұрын
@@taylorwalton_socfortress thanks you , really helpful 👍
@pleibling
@pleibling 2 жыл бұрын
Hi, i got a question - i try the Wazuh VM, but i can not see the Points Security Events, Incident Response or Malware detection under Modules. Are they included in the Open Source Freeware Version (i want to use it in my Homelab)? Thanks a lot.
@mehrdadejalali
@mehrdadejalali 2 жыл бұрын
@OpenSecure thank you for this awesome tutorial about the Active Response feature. I have a question: how wazuh keep state? ( in your Video Example, source IP ) and how wazuh can revert the executed command reverse? for example, when the command "firewall-drop.sh" is triggered, iptables will be executed so the source IP will be forbidden about "timeout" duration after that the source IP will be removed from the forbidden list, but how? where the exact revert command is?
@tillbreithaupt4258
@tillbreithaupt4258 2 жыл бұрын
Hi Mehrdad, saw your comment and had the same question but then at the same time is saw in the video at 25:07 that the same script runs an unblock command triggred by rule.id 602. Maybe you can configure the blocked time in this rule.
@tomasturina511
@tomasturina511 2 жыл бұрын
Hi Mehrdad. About how Wazuh keeps the state of the AR that is configured with a timeout, I'll proceed to explain this. When configuring an AR in the manager, it shares this configuration with all the agents connected to it. This includes the AR names, the executable files and the timeout for each one. When an AR is received in the agent, it checks this information: verifies if the executable file exist and if it has a timeout (in seconds) configured. When it has configured a timeout, the agent executes the AR and stores in memory a reminder that this AR has to be reverted after the timeout configured. When the timeout expires, the agent executes the AR with the reverse action. I hope this information helps to clarify your doubts.
@JakobLundberg
@JakobLundberg 2 жыл бұрын
Check out the documentation about custom stateful active responses. It describes how the script should handle the timeouts. documentation.wazuh.com/current/user-manual/capabilities/active-response/custom-active-response.html#stateful-active-responses
@ryoka1g
@ryoka1g 2 жыл бұрын
great video!! i have deployed wazuh with elastic stack 7.14.2 and a suricata sensor. And i did a demonstration of the attacks that are on the site successfully (shellshock, brute force etc) So my question is do you have any suggestion on where i can find more attacks to replicate??
@taylorwalton_socfortress
@taylorwalton_socfortress 2 жыл бұрын
Hey Chris! Check out this APT simulator: github.com/NextronSystems/APTSimulator I like to use this tool to simulate a wide range of attacks. Hope this helps and thanks for watching :)
@ryoka1g
@ryoka1g 2 жыл бұрын
@@taylorwalton_socfortress thanks brother you are the best
@radenjaswan3770
@radenjaswan3770 Жыл бұрын
great video, but i have an issue that my server is using firewalld instead of iptables, is there any script or way to run active response on firewalld?
@marciolima174
@marciolima174 3 жыл бұрын
Onde fica os hosts bloqueados? Onde posso desbloquear caso precise?
@eliafagaming9829
@eliafagaming9829 3 жыл бұрын
Hi, thank you for this awesome tutorial about Active Response feature. I have a question: How can I implement this for a Windows Agent instead of Linux?
@taylorwalton_socfortress
@taylorwalton_socfortress 3 жыл бұрын
Hey Elia, thanks for taking the time to watch this video! Active response can be enabled for Windows agents as well. Instead of using the firewall-drop.sh script we will use the netsh.cmd command. win_route-null route-null.cmd srcip yes Notice we are still expecting the "srcip" We then set the active response tag win_route-null local 8 900 This example would drop traffic from any source ip that triggered a level 8 or above alert. Of course we can sub the tag out for a tag like we do in the video. You can find more details here: documentation.wazuh.com/current/user-manual/capabilities/active-response/remediation-configuration.html Hope this helps and let me know if you still have some questions and I'd be happy to help!
@eliafagaming9829
@eliafagaming9829 3 жыл бұрын
@@taylorwalton_socfortress Thank you very much for the answer. I have already tried this yesterday, but it doesn't work. Basically beacuse there is no "srcip" field generated by the rule. Let me explain: I have a VirtualBox machine with Kali for doing some ssh bruteforce test, the target is a Windows PC (the agent) where OpenSSH is installed. I set the "ossec.conf" file of the Windows Agent like this: OpenSSH/Admin eventchannel And in this way the agent can send logs about OpenSSH (Event Viewer) to Wazuh Manager. Get to the point, when the attack begins, on Wazuh Manager only this rules are triggered: 60014 and 60011 of the "0575-win-base_rules.xml" file and none of this cointain "srcip". I hope I have explained the situation well. Probably I'm doing something wrong because I'm new to Wazuh. Any advice or solution to get the goal is welcome! Thanks
@taylorwalton_socfortress
@taylorwalton_socfortress 3 жыл бұрын
Hey Elia, I am running into a similar issue on my end. Let me keep testing and I will get back to you. May call for another video :)
@taylorwalton_socfortress
@taylorwalton_socfortress 3 жыл бұрын
Hey Elia, Thank you for your patience. Unfortunately, since Window's Event logs do not bring in a srcip, the active response feature for Windows servers is currently broken. However, the Wazuh team has been working on a feature that will allow us to add our own fields, we will no longer be limited to srcip, and this has been already merged with their 4.2 release: github.com/wazuh/wazuh/pull/7317. Once that is released, I will make a video on the update process and a tutorial using this new feature. Stay tuned! :)
@arodtube7668
@arodtube7668 3 жыл бұрын
To confirm... The `command` and `active-response` syntax goes on the server `ossec.conf`. Correct? Meaning those .conf changes you did on kibana were for the server component. Nothing on the agents. Also, once you called that `active-response`, it ran the "binary/script" that resides on the agents. How do you get more (custom) scripts to the agents from the server?
@taylorwalton_socfortress
@taylorwalton_socfortress 3 жыл бұрын
Hey Arod, correct. The "command" and "active-response" blocks are made on the ossec.conf of the Wazuh-Manager under /var/ossec/etc/ossec.conf. Through Kibana, we are able to interact with the wazuh-api (which only runs on the wazuh-manager) and make changes to the ossec.conf file without having to manually logon to the wazuh-manager server and opening the ossec.conf file with a text editor. The active response workflow would be as followed: 1. Log is sent from the wazuh-agent to the wazuh-manager 2. The wazuh-manager compares the log it received to its rulesets. 3. The wazuh-manager determines the log matches a rule (rule id) and marks it as so 4. The wazuh-manager sees that the rule id that the log matches is configured within the active response block of the ossec.conf file on the wazuh-manager. 5. The wazuh-manager sends a message to the wazuh-agent (it finds this by the agent.id field within the log) to run the active response script detailed in the "active response" block of the ossec.conf. Firewalld-drop.sh in our example. 6. The wazuh-agent receives this message and runs the script. The script is stored on the wazuh-agent locally under "/var/ossec/active-response/bin/firewalld-drop.sh". You have the ability to create custom scripts, whether that be bash, python, powershell, etc. and have them be called during the active response workflow. You would have to make sure that the wazuh-manager and wazuh-agent have the script locally so that each server could run it. Otherwise it will complain saying that the script you are trying to run does not exist. When remotely copying scripts, files, etc. I like to use the "scp" command. Let me know if this helps, or any other questions you may have. Thanks for watching!
@rahulshah1559
@rahulshah1559 3 жыл бұрын
awesome tutorial🔥🔥🔥🔥 but for some reason, i'm not able to display active-response's (sh actions) logs in events(kibana), what could be the reason
@taylorwalton_socfortress
@taylorwalton_socfortress 3 жыл бұрын
Hey Rahul, apologies for the late response. Could you clarify alittle more as to what you are having trouble viewing? Is it the rule ids 601, and 602 that are shown around the 28:07 timestamp of this video? Thanks for watching and I am looking forward to your response!
@shijieteosj
@shijieteosj 2 жыл бұрын
@@taylorwalton_socfortress Not sure if this is a bit too late, but I'm having the same issue, with the rule ids 601 and 602 missing. I can see it from the active-responses.log file from the agent though.
@dozaweza4883
@dozaweza4883 3 жыл бұрын
what if we want to give active response for more than one SIP thanks
@taylorwalton_socfortress
@taylorwalton_socfortress 3 жыл бұрын
Hey Doza, active response will trigger for any source ip that triggers the rule. In the example in the video that rule id was: 5712. So any time rule 5712 is triggered, whatever source ip that triggered the rule will be read by active response and active response will create an iptables rule with that source ip. Hope that helps and thanks for watching!
@marciolima174
@marciolima174 3 жыл бұрын
How do I see banned ip's directly in the firewall drop?
@christianborla
@christianborla 2 жыл бұрын
Hi Marcio I hope you are doing fine!! To check firewall drop IP´s into Linux, run: iptables -L INPUT -v -n | grep When Wazuh Active response netsh.c block an IP, you can check banned ip running following command on windows box. netsh advfirewall firewall show rule name="WAZUH ACTIVE RESPONSE BLOCKED IP" It should show the Rule Name and a description like: Enable: Yes Direction Profiles Grouping LocalIP RemoteIP Protocol Edge traversal Action if it´s disable will show: No rules match the specified criteria. Let me know if that info is useful! regards!
@trutyger09
@trutyger09 2 жыл бұрын
My brother, is it "Wazuh", as in "WAH-ZUHH" or "WAH-ZOO"? I swear I've heard it pronounced at least 18 different ways - two just in this video. Please help a brother out, lol
@taylorwalton_socfortress
@taylorwalton_socfortress 2 жыл бұрын
Lol tomato-tomato :)
@TheMightyAgency
@TheMightyAgency 2 жыл бұрын
I've watched the videos from the official Wazuh channel and heard them pronounce it the right way (presumably) but almost everywhere else, I hear it pronounced WAH-ZOO. I think this a great lesson in any marketing effort. That is, think about how your company name will be pronounced by the general public, irrespective of how obvious it is to you. If I need to pronounce this correctly, I think of it as WAZ and then add in the Uh, as in uh-oh. But it's a pickle nonetheless.
Is it Cake or Fake ? 🍰
00:53
A4
Рет қаралды 20 МЛН
Always be more smart #shorts
00:32
Jin and Hattie
Рет қаралды 31 МЛН
Wazuh - 03. Test attaque brute force sur ssh
20:11
xavki
Рет қаралды 4,7 М.
10 INNOVATIONS THAT WILL CHANGE YOUR LIFE
12:35
TechDopia
Рет қаралды 1,3 М.
Chapter 12 - Wazuh Decoders and Rules
49:49
SIEMonster
Рет қаралды 15 М.
USB Detection with Wazuh - Detect When A Rogue USB Is Plugged In!
8:48
Main filter..
0:15
CikoYt
Рет қаралды 11 МЛН
Iphone or nokia
0:15
rishton vines😇
Рет қаралды 1,9 МЛН
Asus  VivoBook Винда за 8 часов!
1:00
Sergey Delaisy
Рет қаралды 1,1 МЛН
ПОКУПКА ТЕЛЕФОНА С АВИТО?🤭
1:00
Корнеич
Рет қаралды 3,1 МЛН