Testing Wazuh at home

Testing Wazuh at home

Today I had an hour to spare and decided to test Wazuh. I have heard about OSSEC many years ago but never tried it. Wazuh is an open source fork of OSSEC.

Getting started

Download the virtual machine (.ova file) based on CentOS 7. You can find the direct link here. https://documentation.wazuh.com/3.12/installation-guide/virtual-machine.html

The machine is set up with 4 cores, 4 gigs of memory and a 40GB disk.

Start the virtual machine, I did this in VirtualBox. It can take a few minutes for it to respond and show the login prompt. I waited around 5 minutes. This was probably because the network did not work right away. I had set the machine in bridge mode on my wireless card, but it was apparently not supported to have multiple IP addresses on a single MAC by my wireless network - moving on. I ended up setting up the network as NAT, and then port forwarding all the ports on this page. Be aware that Kibana is running on port 443 and not 5601 on the virtual machine. https://documentation.wazuh.com/3.8/getting-started/architecture.html#required-ports

I had to set the keyboard with the command "localectl set-keymap dk-mac" - you can list your options with "localectl list-keymaps".

For testing the agent I got the installer from this page. https://documentation.wazuh.com/3.12/installation-guide/installing-wazuh-agent/macos/wazuh_agent_package_macos.html#wazuh-agent-package-macos

I swiftly went to the Wazuh app within Kibana to find the "Deploy new agent" button.

No alt text provided for this image

Only to find that I didn't need this, because I already installed an agent on my laptop. I needed to configure the agent manually, so this guide came in handy. https://documentation.wazuh.com/3.12/user-manual/registering/index.html#register-agents

I personally opted for the "simple registration" on this page. https://documentation.wazuh.com/3.12/user-manual/registering/macos-simple-registration.html

No alt text provided for this image

It worked as intended even though everything is running locally on my machine. This is when I got to play around with the features a bit.

No alt text provided for this image

Synchronize agent configuration from the manager

To be able to synchronize configuration from Wazuh manager to the agents we need to set a command on every agent installed. This is done with this command on my Mac:

No alt text provided for this image

After this is done, restart the agent with this command. "sudo /Library/Ossec/bin/ossec-control restart".

File Integrity Monitoring

I wanted to monitor the /Applications folder for file changes. I set this up by enabling by setting up this setting on the Wazuh manager in the "agent.conf" file for the "default" group of agents.

No alt text provided for this image

Be aware that the agents will use a lot of CPU while calculating the SHA256 for all the applications. Restart all remote agents by running this command on the manager: "/var/ossec/bin/agent_control -r -a".

Analyzing Cisco ASA syslog

I setup the ASA to send syslog toward my Wazuh setup - and nothing happened. Apparently that also need to be setup in the "/var/ossec/etc/ossec.conf" file on the manager.

After much trial and error I figured out that the VirtualBox network also needed to be allowed.

No alt text provided for this image

This was all that I has time for. Overall Wazuh seems like a very competent setup - especially for the price of 0. It does have a steep learning curve though, but that is the fun part of it all.

If you liked this post, please click "Like" so that others can find it.

About: Dennis Perto is an enthusiastic security analyst who places great honour in genuinely humble consulting. He believes in serving the client with expert knowledge, and in not being afraid to admit when he is not the right expert anymore. He enjoys researching vulnerabilities and exploits to advise trusted partners.

Feel free to connect with me here on LinkedIn, and follow me on Twitter: @PertoDK


Trong Hoa Dinh

Network Operation | Network Security Administrator

2 年

This post so helpful for me. Thank you very much. Do you have any suggestion for endpoint security tools intergrate with wazuh ?

回复
Ila zara

Freelance graphic designer

3 年

Hey i wanna change the layout of wazuhh? need suggestion?

回复
???? Adrian G.

Security Engineer at AARNet

4 年

Great write up Dennis. Wazuh has also been on my radar but I def need to get some hardware for the lab!

Sol Pandor

A results-driven professional helping innovative companies boost profits and secure strong returns by protecting against cyber threats. We also run a business providing short-term contractor accommodation across the UK.

4 年

Sounds like fun Dennis. Currently playing with ELK and a similar steep learning curve ?? Still have a way to go

要查看或添加评论,请登录

Dennis Perto的更多文章

  • Concluding on my OSCP journey

    Concluding on my OSCP journey

    Some fear the OSCP. Some see the OSCP as an entrance into the penetration testing- or even the IT Security field.

    61 条评论
  • Simple drop box for full network access

    Simple drop box for full network access

    Part 2. Why, How, What, Edit C2, Edit drop box, Full access.

    6 条评论
  • Simple drop box with reverse shell

    Simple drop box with reverse shell

    Part 1. Why, How, What, Create C2, Create drop box, Got shell.

    15 条评论
  • Cisco WLC on QNAP NAS

    Cisco WLC on QNAP NAS

    For a long time I have been looking for a home lab solution for the Cisco Wireless Lan Controller. My QNAP NAS supports…

    3 条评论
  • FirePOWER 8200 and 8300 hardware specs

    FirePOWER 8200 and 8300 hardware specs

    These specs are my personal notes from working with the different appliances. Please tell me if you find any of this…

    5 条评论
  • Looking at the future of Snort

    Looking at the future of Snort

    Differences between Snort 2 and Snort 3 (dubbed Snort++) can be seen in this document on Github. The biggest difference…

    10 条评论
  • Reimage "old" Firepower appliances

    Reimage "old" Firepower appliances

    As you may already know I am working with Cisco Firepower on a daily basis. Not just the new and shiny Firepower 2100…

    15 条评论
  • Honeypot generating blacklists for Cisco Firepower

    Honeypot generating blacklists for Cisco Firepower

    I will iterate through the steps of grabbing data from the log files generated by Heralding to make blacklists on the…

    12 条评论
  • SSL/TLS decryption in Cisco hardware

    SSL/TLS decryption in Cisco hardware

    I am about to write a bit about the problems with decrypting traffic both before and after the year of 2018. I will…

    16 条评论
  • Firepower Threat Defense packet processing

    Firepower Threat Defense packet processing

    Do you ever have that feeling that the documentation is not technical enough? I do. I have seen a whole bunch of…

    20 条评论

社区洞察

其他会员也浏览了