Security Onion- IDS, NSM, and log management

What if you want an IDS system that monitors malicious activities and provides you with logs (Network Security Monitoring) and graphs to help protect your network?  And what if you want an easy setup that provides you with information that will help you – something with a GUI interface?   Security Onion can provide you with the defacto IDS system – Snort, Squert and a ton of other tools to help you.  While there are options, Security Onion offers the choice of Snort (http://snort.org/) or Suricata (http://suricata-ids.org/).

The setup below shows a test system using VMWare with 2 processors and 2 Gb of RAM if you want to try it out.   While the bare minimum is suggested to be 3 Gb, a production environment should have 8- 128 Gb of RAM, a ton of hard drive space for logs and two network cards.  One network card for management and one to sniff.

Security Onion’s ISO can be downloaded from SourceForge.   While there is a ton of how-tos on the internet about Security Onion, there is a great deal of information on there blog located here.

Here’s a simple setup I did at home to try out Security Onion.  Using VMware’s Player (non-commercial use).  If you plan on trying Security Onion or deploying it in a production environment, you should use the commercial version or have a system that supports the minimum requirements.

menuinstallliveLive Runninginstalling rullinstalling driveinstalling drive erase  Installing files after time keyboard finished

 

Once you restart, you’ll need to run setup again to enter an email address for squert and setup a password. Once this is done, you can open the shortcuts on the desktop or use your host computer to login. Once this is complete, login to Snorby’s url.

While snort is running, Snorby will present a dashboard.  You may be surprised to see no threats once you login.  You can expedite this process by running NMap (Zenmap against the virtual machine) if you want to see threats.

What is Snorby? “ Snorby is a web application interface to view, search and classify Snort and Suricata alerts and generate various types of reports, such as most active IDS signatures, most active sensors, and top source and destination IP addresses.”  more information.
2 snorby

Once you run NMap, click on More Options in the right corner and update the Cache

2a cache update

Give Security Onion just a few seconds and refresh the screen.  You’ll see the events logged.  This will visually show you not only how  many threats were ‘ seen’ on the network but will categorize and graph them.

3 snorby 3 severity

Clicking on the events will show each event and give you the option to categorize unknown threats or to reclassify threats.
4 nmap to test

Logging in to Squert allows you to see threats along with maps and information from threats.

5 squert

Squert map

ELSA – allows you to query and look for information.

6 Elsa

What does NMap show when Security Onion is scanned?

7 is it logging

 

 

 

Introduction to Security Onion

Security Onion Blog

 

Cannot reset winsock, isatap yellow exclamation, no wireless or internet

Have a wireless card that doesn’t see the wireless?  Does checking the Device Manager show a yellow exclamation mark on the isatap or Teredo Tunneling Pseudo Interface?

Mickey and I tried everything on someone’s computer and we couldn’t delete the wireless or other networking adapters above that had a problem.   The error, it turns out can be from multiple areas.   We found someone on the internet who doesn’t want any credit.  So to that ‘person’  we say thanks and we owe you.

Always backup your computer before performing advanced commands.

Steps

  1. Load the latest driver for the wireless or Ethernet card.
  2. Reboot if necessary
  3. Go to the properties of the nic card with a problem.  Uncheck IPv6 protocol.   You can check this later after the repair. Close the properties Windows
  4. Go to the Device Manager
  5. Double click on the isatap with a yellow exclamation, click update driver, browse my computer, select next (the driver will be highlighted) and follow through to the finish.
  6. Right Click and remove the Teredo Tunneling Pseudo Interface if it is there.
  7. Open a command prompt as an administrator
  8. Type netsh int ipv4 reset c:\resetlog.txt – hit the enter key    - Do not reboot  -
    Did you have an error that looks like this?  If so, you must modify your registry (see error list below)
    If not, continue to step 9

    Error
  9. Type netsh reset winsock catalog  - reboot

 

Error list  - Resetting the winsock and TCP/IP stack

If you type the following and receive an error -

netsh int ipv4 reset
netsh reset winsock catalog

Remove any antivirus solution you may have.  Often these will prevent the winsock from being modified.  Use removal tools as necessary.

Next find the following key by opening the registry editor (regedit at the run line)

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Nsi\{eb004a00-9b1a-11d4-9123-0050047759bc}\26

You may see more than one “26″ key – if so, look for all of the 26 values under the keys and perform the following action on each

Right click on the “26″ key, choose “Permissions”, add a checkmark on “Full control” for the everyone group.

Close the registry editor.

Now for a full reset – Open a command prompt as an admistrator -
netsh int ip reset 

 

  • ipconfig /flushdns
  • nbtstat -R
  • nbtstat -RR
  • netsh int ipv4 reset
  • netsh winsock reset catalog
This will rebuild the tcp/ip protocol stack (fully)

Reboot.

Hopefully you have a connection.   Make sure you reload your antivirus software.

 

Microsoft confirms it’s dropping Windows 8.1 support

From Infoworld -

Microsoft confirms it’s dropping Windows 8.1 support.

 

Here’s how this works – If you have Windows 8.1, You must update to Windows 8.1 Update (Yes, someone named it Windows 8.1 Update).   This will insure you get future security updates in the near future.

Keep updating until you see the power symbol and the search icon in your Metro screen!  And then keep updating …don’t miss any updates so you are covered on future updates.

See our troubleshooting information on getting updates if you have problems.

update

 

More Tips on updating issues-

If the installation fails, try the following-

Run CMD as administrator
Type the following: dism /online /remove-package /packagename:Package_for_KB2919355~31bf3856ad364e35~amd64~~6.3.1.14
After this finishes, type: dism /online /cleanup-image /startcomponentcleanup
Retry the upgrade again.

 

Error 0x80071a91?  Try this update. http://support.microsoft.com/kb/2939087/en-us

 

An unnecessary path to tech: A Bachelor’s degree

An unnecessary path to tech: A Bachelor’s degree.

An excellent article on education and technical careers from Computerworld.  TCAT Shelbyville”s CIT program has a 98% retention and 92%+ placement.   Is a degree worth the money?  Yes, after you start your technical career.  Your education in technology cannot end once you start your career.    Are certifications worth their weight?  Absolutely.  If you know the hands-on.   The three, academia, certifications and hands-on is the fastest way to a career in IT.

ReFS – Data Protection – Windows 8.1 and Server 2012

NTFS.  You’ve worked with it for years.  Microsoft’s NTFS is not being replaced by ReFS.   ReFS is available for Windows 8.1 and Server 2012.  What if you have extra drives and need the data protection?  ReFS may be for you. (or Storage Spaces ~See upcoming article)

ReFS is the Resilient File System that makes disk more reliable and works like this.

  • Uses checksums to detect if your data is changed
  • Able to detect and recover from corruption
  • Data is written to a new part of the disk if the above is the case
  • Recovers without limiting availability of the disk
  • Integrity data streams can also be enabled
  • File system metadata is protected
  • No chkdsk
  • Handles 1 Yottabyte ( 1 quadrillion GBs?)

While the boot volume should still be in NTFS, this file system is ideal for servers and workstations that need extra data protection.  The other drives can ideally be made ReFS.

More information from Microsoft

Windows Storage Spaces and ReFS – Is it time to ditch raid for good? via Betanews

 

 

Dell DDA – Upgrading from Windows 8 to 8.1

Having a problem uninstalling the Dell Data Access Software and upgrading to 8.1?  Here’s some tips -

 

  • Dell’s recommendation for upgrading from Windows 8 to Windows 8.1  Link
  • If the software does not uninstall properly, run Microsoft’s fix-it to uninstall the program (Link)  you may also run a registry cleaner that can clear the software from your registry.

 

Our Solution – This may not fit your needs.  Always backup your data.

  • Uninstall the Dell Data Access software  (We had 15 pcs that had remains left after the uninstall
  • Reboot
  • Make sure the software is not listed in the Programs and Features list
  • Navigate to C:\program files and C:\program files (x86)
  • Remove the files under the subfolder ‘Dell’  that are related to the Dell Data Access software
  • If you cannot, open the task manager and click on the details tab.
  • Find the process TDMService.exe, right click and end the process tree
  • Immediately delete the .exes in the above subfolder – you may have to end the process (the process may restart)
  • Delete the files manually (Only the protection files and folders)
  • Run the microsoft fix-it above and/or a registry cleaner
  • Reboot
  • Install Windows 8.1

It seems this is a problem that has many fixes – The above is our fix that worked for us…

 

Other tips that may help once Windows 8.1 upgrading starts -

Remove 3rd party software

Disable the anti-virus software

Run cleaners and defrag

The dangers of using outdated software


 Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network.

The dangers of using outdated software.

Microsoft Surface Pro-ready for manufacturing, business and industry

The Microsoft Surface Pro has proven to be versatile in the workplace.  Mr. Arnold our Industrial Maintenance instructor uses the Microsoft Surface Pro to connect to nearly a hundred PLCs, motors, robots and other industrial components.

So why is this tablet perfect for business and industries?

100_3087

External DVD Attached through USB port

100_3088

USB EasyLINK to transfer files from one computer to another

100_3091

The Windows below shows the USB EasyLINK software (loaded on the USB device)

100_3090100_3093

100_3094

Many industrial components require a floppy disk drive – (Above and Below)

100_3092

What if you need to expand your USB with a USB hub or two?

100_3095

100_3097100_3096

IT personnel can attach a Wireless Spectrum Analyzer or multiple wireless cards for site surveys or other wireless needs.

100_3099

 

100_3103100_3101   100_3100100_3102

Four Wi-Fi Nic cards shown above

100_3104

Multitasking (above)

100_3105

Joining a domain (above)

100_3106

100_3107

Connect an external drive, card reader or multiple USB drives at the same time.

Use all of your Windows based software…now why was the Surface a bad idea?  It’s not…

Installing Linux Lite – A mini review

Home users that ONLY check email and use very few other programs may consider replacing their OS.   Linux has made an exceptional gain over the past several years with a Programs (Add/Remove) component and with hardware drivers.

To see just how Linux Lite stacked up other OSs, I decided to load it in Oracle’s VirtualBox.  The little over 600+mb download is comparable in size to Windows XP.  The ISO can be burned with an image burner to make a bootable CD/DVD.  Before you decide to switch, remember there are limitations to Windows software even with Wine.  Wine is a software application that allows you to run Windows programs.  Hunting around the internet you’ll find hundreds of Linux programs comparable to Windows programs.  You don’t have to look far considering the Linux repository has hundreds of programs.

After loading Oracle’s VirtualBox, simply walk through the New OS wizard, select Linux, allocate 2 GB of RAM and 8 GB of HDD space if you can.  Once you have completed this step, click on Settings and select bridge on the Network Card and load the ISO under storage.

Once you complete that step, start the OS and follow the on screen prompts.

1

(Above) – initial load screen.

2

Loading the OS into RAM

3

Load time of around two minutes for the initial screen to appear.

4

Select your language.

5

The above screen is checks to insure hardware and internet connectivity is ok.

6

Erase the hard drive.

7

Below – set your location for the time.

8

Select the keyboard layout.

9

Setup an initial user and password.

10

Copying files

11

After the installation, Restart your computer (VirtualBox)

12

Booting up from the hard disk drive.

13

Login and options.

14

The initial desktop is clean.  Don’t let this fool you.  The amount of programs and options for an internet user is excellent.

15

 

17 updates

 

Checking for updates is easy.  Simply click on the menu and select update.  Provide your login password and Linux Lite does the rest.

Printer setup

If you have a printer that supports IPP Protocol, login to the printer’s web address and Enable IPP.   The printer in our home is the Samsung SCX-3400 wireless.  An inexpensive laser printer that provides for thousands of pages with Samsung’s toner cartridge.  The printer provides hundreds of options for Windows, Apple, Linus or mobile devices.

printer

 

What programs come with Linux Lite?  Hundreds of items.  Here’s the main categories.

  • Office
  • Games  (Such as steam and others)
  • Graphics  (Gimp and more)
  • Accessories
  • Internet (email and browsers)
  • Multimedia
  • System (dozens of tools)
  • Settings

accessories Games Graphics Internet Multimedia Office settings Sharing System

 

If you ONLY use the internet and want to look into an alternate operating system.  Linux Lite may be for you.  It is easy to use, install and offers hundreds of programs.

ASUS RT-AC66U Dual Band 3.3 802.11AC Router

The Asus RT-AC66U Router continues to lead the pack with firmware downloads with improvements through enhanced features and security.   Last night Jay messaged me with details on one of their features that provides a dual WAN option with fail-over features.  Here’s a couple of screenshots that shows the dual WAN features.

Router

http://www.asus.com/us/Networking/RTAC66U/        (Information)

http://www.asus.com/Networking/RTAC66U/specifications/  (Specifications)

Asus’s latest firmware 3.0.0.4.374_4561 is just one of many firmware updates that proves this router is valuable to homes and businesses.

 

Credit: Jay Matlock

 

ASUS MAP    bandwidth  tRAFFIC     wan oNE Wan Setup     WAN TWO wired

AlphiMAX PTP Estimator provides an excellent way to align your wireless antennas

Need an excellent program to estimate your wireless bridges from building to building?  AlphiMAX provides an excellent online program to estimate your wireless links.

Sign up is easy and fast.  The PTP Estimator requires that you have the Latitude and Longitude of both buildings.  You can get an estimated Lat. and Long. from Google maps.  Find your location on Google maps (you should use a GPS) and right click on the location you want then select “What’s here?” .    This will provide the numbers you need.  Remember, it is best to use a GPS on each site where you intend to erect an antenna.

PTP Estimator

You can also search for a location by name by clicking the area in the center of the online application.  icon

Once you have the Lat. and Long., enter the numbers at the top of the online application.  Click Estimate.

Entering LatandLong

The interface will show you the terrain, Antenna height, compass information, Fresnel Zone Clearance, approximate altitude,  along with product information they provide.

Aligned

 

The estimator also offers a 3D view of your project if you have an active subscription.

AlphiMAX Company Overview
AlphiMAX provides products to help you with your wireless needs.