Menu

Tree [296687] master /
 History

HTTPS access


File Date Author Commit
 README 2010-11-10 Richard Bejtlich Richard Bejtlich [faac4b] Fixed error in README for startupwq.
 SguildLoaderd.tcl.patch 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 SguildMysqlMerge.tcl.patch 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 barnyard2 2010-11-15 Richard Bejtlich Richard Bejtlich [9cad54] Changes to startup scripts.
 barnyard2.conf 2010-11-15 Richard Bejtlich Richard Bejtlich [9cad54] Changes to startup scripts.
 barnyard2.conf.patch 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 log_packets.sh.crontab 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 log_packets.sh.patch 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 pcap_agent 2010-11-15 Richard Bejtlich Richard Bejtlich [296687] Added new startup scripts.
 pcap_agent.conf.patch 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 prep_platform.sh 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 rc-adds.txt 2010-11-15 Richard Bejtlich Richard Bejtlich [9cad54] Changes to startup scripts.
 rc-conf.sh 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 sancp 2010-11-15 Richard Bejtlich Richard Bejtlich [9cad54] Changes to startup scripts.
 sancp.conf.patch 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 sancp_agent 2010-11-15 Richard Bejtlich Richard Bejtlich [296687] Added new startup scripts.
 sancp_agent.conf.patch 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 sensor_agent.conf.patch 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 sguil_database_install_pt1.sh 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 sguil_database_install_pt2.sh 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 sguil_sensor_install.sh 2010-11-10 Richard Bejtlich Richard Bejtlich [5bf82c] Moved sancp.conf and barnyard2.conf in /usr/loc...
 sguil_sensor_install_patch.sh 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 sguil_sensor_users.txt 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 sguil_server_install.sh 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 sguild 2010-11-15 Richard Bejtlich Richard Bejtlich [296687] Added new startup scripts.
 sguild.conf.patch 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 sguild_adduser.sh 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 snort 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 snort.conf.patch 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 snort_agent 2010-11-15 Richard Bejtlich Richard Bejtlich [296687] Added new startup scripts.
 snort_agent.conf.patch 2010-11-09 Richard Bejtlich Richard Bejtlich [bd1866] Message
 snort_src_install.sh 2010-11-15 Richard Bejtlich Richard Bejtlich [9cad54] Changes to startup scripts.

Read Me

# $Id: README,v 1.5 2009/02/05 04:35:20 taosecurity Exp $ #

WARNING: Calling these files "scripts" does injury to the word.
These are more like "commands run in order that help me install
Sguil in a certain configuration that I like, and which probably
won't meet your needs."  Still, I put them here in the event
someone else might find them useful.  They are totally
unsupported.  If you have questions I recommend using the
NSMNow distribution for Debian/Ubuntu at
http://www.securixlive.com/nsmnow/ .

Hints from Richard Bejtlich (taosecurity@gmail.com)

The scripts are hard-coded to use Snort 2.9.0.1.
This requires explicit modifications if you want to use
a different version.

The scripts also use a version of Sguil from CVS
checked out on 02 Feb 09, posted at bejtlich.net.

You must have a /nsm partition ready for NSM data and rules!

Recommended run order:

Register with Sourcefire and download snortrules-snapshot-2900.tar.gz to
 /tmp .

Run 

prep_platform.sh

which adds the Bash package, adds users sguil and analyst,
 and modifies /etc/hosts.

Run

sguil_sensor_install.sh

to create certain directories and install Sguil sensor code.

Run

snort_src_install.sh

Modify the following to match your environment.

You may want to replace ExtNet with the name you want for the sensor group.

snort.conf.patch --  usually no changes ***
barnyard2.conf.patch -- replace vm with your hostname, em0 with your NIC  ***
snort_agent.conf.patch -- replace vm with your hostname ***
pcap_agent.conf.patch -- replace vm with your hostname ***
sancp_agent.conf.patch -- replace vm with your hostname ***
sancp.conf.patch -- usually no changes ***
log_packets.sh.patch -- replace vm with your hostname, em0 with your NIC ***

Run 

sguil_sensor_install_patch.sh

Edit snort.conf to set your HOME_NET and enable rules you want.

Disable local.rules if you do not have it!

Remember to enable Emerging Threats rules by editing /nsm/rules/emerging.conf.

Run

sguil_server_install.sh

sguil_database_install_pt1.sh

sguil_database_install_pt2.sh

To add support for 

/usr/local/etc/rc.d/snort
and
/usr/local/etc/rc.d/sancp
and
/usr/local/etc/rc.d/barnyard

edit rc-adds.txt (replace vm and em0 with your hostname and interface,
respectively).

and then run

rc-conf.sh

Start the following as root:

/usr/local/bin/log_packets.sh restart

Use the /usr/local/etc/rc.d/ system to start

snort
sancp
barnyard

Add a Sguil client user by running

sguild_adduser.sh

You may want to configure sguild to listen on specific interfaces, like

set BIND_SENSOR_IP_ADDR 127.0.0.1
set BIND_CLIENT_IP_ADDR 172.16.2.1

Set those values in /usr/local/etc/nsm/sguild.conf if so desired.

Start the following as user sguil.  I recommend running each via screen(1).

cd /usr/local/src/sguil-0.7.0/server/
./sguild -c /usr/local/etc/nsm/sguild.conf -u /usr/local/etc/nsm/sguild.users -C /usr/local/etc/nsm/certs

cd /usr/local/src/sguil-0.7.0/sensor/
./snort_agent.tcl -c /usr/local/etc/nsm/snort_agent.conf

cd /usr/local/src/sguil-0.7.0/sensor/
./sancp_agent.tcl -c /usr/local/etc/nsm/sancp_agent.conf

cd /usr/local/src/sguil-0.7.0/sensor/
./pcap_agent.tcl -c /usr/local/etc/nsm/pcap_agent.conf


Before logging into the Sguil server, from another system run

nmap -O TARGET

where TARGET is an IP watched by the sensor.  This will create a few
alerts to review.  Note it takes a few minutes before the first SANCP
entries are loaded into the database.
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.