Compare commits

...

36 Commits

Author SHA1 Message Date
Mike Reeves
fc649a565c Merge pull request #9107 from Security-Onion-Solutions/patch/2.3.182
Patch/2.3.182
2022-11-10 16:30:17 -05:00
Mike Reeves
113b38056b 2.3.182 2022-11-10 15:12:47 -05:00
Mike Reeves
559276534d 2.3.182 2022-11-10 15:06:00 -05:00
Mike Reeves
4acd9f8816 Update soup 2022-11-09 10:10:52 -05:00
Mike Reeves
a7417a7242 Update soup 2022-11-08 14:48:48 -05:00
Mike Reeves
d18ff69ec9 Update VERSION 2022-11-08 14:45:53 -05:00
Mike Reeves
465a1a82d7 Merge pull request #8981 from Security-Onion-Solutions/dev
2.3.181
2022-10-25 14:30:50 -04:00
weslambert
292f66138b Merge pull request #8983 from Security-Onion-Solutions/revert-8982-fix/sensoroni_analyzers_pyyaml_wheel_name
Revert "Change PyYAML .whl file name to comply with Joliet's 240-character limit/threshold"
2022-10-24 16:49:19 -04:00
weslambert
0087768946 Revert "Change PyYAML .whl file name to comply with Joliet's 240-character limit/threshold" 2022-10-24 16:47:30 -04:00
weslambert
712340a027 Merge pull request #8982 from Security-Onion-Solutions/fix/sensoroni_analyzers_pyyaml_wheel_name
Change PyYAML .whl file name to comply with Joliet's 240-character limit/threshold
2022-10-24 14:14:45 -04:00
Wes
1caac3f0b0 Add PyYAML .whl files back since they were 'deleted' in the previous commit. 2022-10-24 18:06:19 +00:00
Wes
54a5dd6cbd Change name of PyYAML .whl file to remain under Joliet's 240-character limit/threshold 2022-10-24 18:05:15 +00:00
Mike Reeves
6570177b0c Merge pull request #8979 from Security-Onion-Solutions/2.3.181
2.3.181
2022-10-24 11:39:08 -04:00
Mike Reeves
f7ed992f24 2.3.181 2022-10-24 11:33:31 -04:00
Mike Reeves
4a18f8d18a 2.3.181 2022-10-24 11:32:19 -04:00
Jason Ertel
b8884b6ac9 Merge pull request #8968 from Security-Onion-Solutions/181soup
update soup for 2.3.181
2022-10-21 12:00:58 -04:00
Jason Ertel
05e271af47 update soup for 2.3.181 2022-10-21 11:52:54 -04:00
Mike Reeves
58e80a9db8 Merge pull request #8964 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update VERSION
2022-10-21 10:45:44 -04:00
Mike Reeves
e16fc3605e Update VERSION 2022-10-21 10:43:34 -04:00
Mike Reeves
2127ba90ee Merge pull request #8925 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update VERSION
2022-10-17 10:51:02 -04:00
Mike Reeves
3373aef87d Update VERSION 2022-10-17 10:50:14 -04:00
Mike Reeves
fa45e8ded7 Merge pull request #8924 from Security-Onion-Solutions/dev
2.3.180
2022-10-17 10:41:06 -04:00
Mike Reeves
6d0ead7b5b Merge pull request #8923 from Security-Onion-Solutions/2.3.180
2.3.180
2022-10-17 09:47:06 -04:00
Mike Reeves
a2a6625f3b 2.3.180 2022-10-17 09:39:07 -04:00
Doug Burks
0d807d20f4 Merge pull request #8914 from Security-Onion-Solutions/dougburks-patch-1
Remove destination_geo.organization_name from Sysmon Network sankey diagram
2022-10-13 13:03:51 +00:00
Doug Burks
f4042263a3 Remove destination_geo.organization_name from Sysmon Network sankey diagram 2022-10-13 08:59:10 -04:00
Doug Burks
a930f8233d Merge pull request #8899 from Security-Onion-Solutions/dougburks-patch-2
Update soup for 2.3.180
2022-10-11 17:14:55 +00:00
Doug Burks
7401008523 Update soup for 2.3.180 2022-10-11 12:58:37 -04:00
Doug Burks
5199ea483e Merge pull request #8878 from Security-Onion-Solutions/feature/improve-sysmon-dashboards
FEATURE: Add new Sysmon dashboards #8870
2022-10-07 16:47:02 +00:00
doug
454a7a4799 FEATURE: Add new Sysmon dashboards #8870 2022-10-07 11:52:49 -04:00
Doug Burks
6fb7733d8c Merge pull request #8875 from Security-Onion-Solutions/dougburks-patch-1
Increment SO to 2.3.180 and Elastic to 8.4.3
2022-10-07 11:13:13 +00:00
Doug Burks
ab17cbee31 Update Elastic to 8.4.3 2022-10-07 07:03:10 -04:00
Doug Burks
9991f0cf95 update Elastic to 8.4.3 2022-10-07 07:02:24 -04:00
Doug Burks
44d46b06a2 increment version to 2.3.180 2022-10-07 06:58:07 -04:00
Mike Reeves
ba7231f07d Merge pull request #8841 from Security-Onion-Solutions/TOoSmOotH-patch-5
Update VERSION
2022-10-03 08:46:19 -04:00
Mike Reeves
8dc11ea23a Update VERSION 2022-10-03 08:43:39 -04:00
10 changed files with 63 additions and 20 deletions

View File

@@ -1,6 +1,6 @@
## Security Onion 2.3.170
## Security Onion 2.3.182
Security Onion 2.3.170 is here!
Security Onion 2.3.182 is here!
## Screenshots

View File

@@ -1,18 +1,18 @@
### 2.3.170-20220922 ISO image built on 2022/09/22
### 2.3.182-20221109 ISO image built on 2022/11/09
### Download and Verify
2.3.170-20220922 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.170-20220922.iso
2.3.182-20221109 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.182-20221109.iso
MD5: B45E38F72500CF302AE7CB3A87B3DB4C
SHA1: 06EC41B4B7E55453389952BE91B20AA465E18F33
SHA256: 634A2E88250DC7583705360EB5AD966D282FAE77AFFAF81676CB6D66D7950A3E
MD5: E472D5A7C64662435F84FD56491D8967
SHA1: D2069317553AF0A1FB4FB6FE15583FF4E8CB2973
SHA256: A074EB38B88C0A00BDFD7FB75B4ECB7C46CB0B4CC993CAB81EFDC708B0075D2C
Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.170-20220922.iso.sig
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.182-20221109.iso.sig
Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
Download the signature file for the ISO:
```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.170-20220922.iso.sig
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.182-20221109.iso.sig
```
Download the ISO image:
```
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.170-20220922.iso
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.182-20221109.iso
```
Verify the downloaded ISO image using the signature file:
```
gpg --verify securityonion-2.3.170-20220922.iso.sig securityonion-2.3.170-20220922.iso
gpg --verify securityonion-2.3.182-20221109.iso.sig securityonion-2.3.182-20221109.iso
```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
```
gpg: Signature made Thu 22 Sep 2022 11:48:42 AM EDT using RSA key ID FE507013
gpg: Signature made Wed 09 Nov 2022 07:30:32 AM EST using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.

View File

@@ -1 +1 @@
2.3.170
2.3.182

View File

@@ -547,6 +547,9 @@ preupgrade_changes() {
[[ "$INSTALLEDVERSION" == 2.3.140 ]] && up_to_2.3.150
[[ "$INSTALLEDVERSION" == 2.3.150 ]] && up_to_2.3.160
[[ "$INSTALLEDVERSION" == 2.3.160 ]] && up_to_2.3.170
[[ "$INSTALLEDVERSION" == 2.3.170 ]] && up_to_2.3.180
[[ "$INSTALLEDVERSION" == 2.3.180 ]] && up_to_2.3.181
[[ "$INSTALLEDVERSION" == 2.3.181 ]] && up_to_2.3.182
true
}
@@ -566,7 +569,9 @@ postupgrade_changes() {
[[ "$POSTVERSION" == 2.3.140 ]] && post_to_2.3.150
[[ "$POSTVERSION" == 2.3.150 ]] && post_to_2.3.160
[[ "$POSTVERSION" == 2.3.160 ]] && post_to_2.3.170
[[ "$POSTVERSION" == 2.3.170 ]] && post_to_2.3.180
[[ "$POSTVERSION" == 2.3.180 ]] && post_to_2.3.181
[[ "$POSTVERSION" == 2.3.181 ]] && post_to_2.3.182
true
}
@@ -652,14 +657,32 @@ post_to_2.3.140() {
post_to_2.3.150() {
echo "Nothing to do for .150"
POSTVERSION=2.3.150
}
post_to_2.3.160() {
echo "Nothing to do for .160"
POSTVERSION=2.3.160
}
post_to_2.3.170() {
echo "Nothing to do for .170"
POSTVERSION=2.3.170
}
post_to_2.3.180() {
echo "Nothing to do for .180"
POSTVERSION=2.3.180
}
post_to_2.3.181() {
echo "Nothing to do for .181"
POSTVERSION=2.3.181
}
post_to_2.3.182() {
echo "Nothing to do for .182"
POSTVERSION=2.3.182
}
stop_salt_master() {
@@ -951,6 +974,21 @@ up_to_2.3.170() {
INSTALLEDVERSION=2.3.170
}
up_to_2.3.180() {
echo "Upgrading to 2.3.180"
INSTALLEDVERSION=2.3.180
}
up_to_2.3.181() {
echo "Upgrading to 2.3.181"
INSTALLEDVERSION=2.3.181
}
up_to_2.3.182() {
echo "Upgrading to 2.3.182"
INSTALLEDVERSION=2.3.182
}
verify_upgradespace() {
CURRENTSPACE=$(df -BG / | grep -v Avail | awk '{print $4}' | sed 's/.$//')
if [ "$CURRENTSPACE" -lt "10" ]; then

View File

@@ -59,7 +59,7 @@ update() {
IFS=$'\r\n' GLOBIGNORE='*' command eval 'LINES=($(cat $1))'
for i in "${LINES[@]}"; do
RESPONSE=$({{ ELASTICCURL }} -X PUT "localhost:5601/api/saved_objects/config/8.4.1" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d " $i ")
RESPONSE=$({{ ELASTICCURL }} -X PUT "localhost:5601/api/saved_objects/config/8.4.3" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d " $i ")
echo $RESPONSE; if [[ "$RESPONSE" != *"\"success\":true"* ]] && [[ "$RESPONSE" != *"updated_at"* ]] ; then RETURN_CODE=1;fi
done

View File

@@ -1 +1 @@
{"attributes": {"buildNum": 39457,"defaultIndex": "2289a0c0-6970-11ea-a0cd-ffa0f6a1bc29","defaultRoute": "/app/dashboards#/view/a8411b30-6d03-11ea-b301-3d6c35840645","discover:sampleSize": 100,"theme:darkMode": true,"timepicker:timeDefaults": "{\n \"from\": \"now-24h\",\n \"to\": \"now\"\n}"},"coreMigrationVersion": "8.4.1","id": "8.4.1","migrationVersion": {"config": "7.13.0"},"references": [],"type": "config","updated_at": "2021-10-10T10:10:10.105Z","version": "WzI5NzUsMl0="}
{"attributes": {"buildNum": 39457,"defaultIndex": "2289a0c0-6970-11ea-a0cd-ffa0f6a1bc29","defaultRoute": "/app/dashboards#/view/a8411b30-6d03-11ea-b301-3d6c35840645","discover:sampleSize": 100,"theme:darkMode": true,"timepicker:timeDefaults": "{\n \"from\": \"now-24h\",\n \"to\": \"now\"\n}"},"coreMigrationVersion": "8.4.3","id": "8.4.3","migrationVersion": {"config": "7.13.0"},"references": [],"type": "config","updated_at": "2021-10-10T10:10:10.105Z","version": "WzI5NzUsMl0="}

View File

@@ -2,10 +2,15 @@
{ "name": "Overview", "description": "Overview of all events", "query": "* | groupby -sankey event.dataset event.category* | groupby -pie event.category | groupby -bar event.module | groupby event.dataset | groupby event.module | groupby event.category | groupby observer.name | groupby source.ip | groupby destination.ip | groupby destination.port"},
{ "name": "SOC Auth", "description": "Show all SOC authentication logs", "query": "event.module:kratos AND event.dataset:audit AND msg:authenticated | groupby http_request.headers.x-real-ip | groupby identity_id | groupby http_request.headers.user-agent"},
{ "name": "Elastalerts", "description": "Elastalert logs", "query": "_index: \"*:elastalert*\" | groupby rule_name | groupby alert_info.type"},
{ "name": "Alerts", "description": "Show all alerts", "query": "event.dataset: alert | groupby event.module | groupby rule.name | groupby event.severity | groupby source.ip | groupby destination.ip | groupby destination.port"},
{ "name": "NIDS Alerts", "description": "NIDS alerts", "query": "event.category: network AND event.dataset: alert | groupby rule.category | groupby rule.gid | groupby rule.uuid | groupby rule.name | groupby source.ip | groupby destination.ip | groupby destination.port"},
{ "name": "Alerts", "description": "Show all alerts", "query": "event.dataset:alert | groupby event.module | groupby rule.name | groupby event.severity | groupby source.ip | groupby destination.ip | groupby destination.port"},
{ "name": "NIDS Alerts", "description": "NIDS alerts", "query": "event.category:network AND event.dataset:alert | groupby rule.category | groupby rule.gid | groupby rule.uuid | groupby rule.name | groupby source.ip | groupby destination.ip | groupby destination.port"},
{ "name": "Wazuh/OSSEC", "description": "Wazuh/OSSEC HIDS alerts and logs", "query": "event.module:ossec | groupby rule.category | groupby rule.uuid | groupby rule.name | groupby agent.id | groupby agent.name | groupby log.full"},
{ "name": "Sysmon", "description": "Sysmon logs", "query": "event.module:sysmon | groupby event.dataset | groupby user.name | groupby process.executable | groupby process.command_line | groupby process.parent.command_line"},
{ "name": "Sysmon Overview", "description": "Overview of all Sysmon data types", "query": "event.module:sysmon | groupby -sankey event.dataset winlog.computer_name | groupby -sankey winlog.computer_name user.name | groupby winlog.computer_name | groupby event.dataset | groupby user.name | groupby dns.query.name | groupby process.executable | groupby winlog.event_data.TargetObject | groupby file.target | groupby source.ip | groupby destination.ip | groupby destination.port"},
{ "name": "Sysmon Registry", "description": "Registry changes captured by Sysmon", "query": "(event.dataset:registry_create_delete OR event.dataset:registry_value_set OR event.dataset:registry_key_value_rename) | groupby -sankey event.dataset winlog.computer_name | groupby winlog.computer_name | groupby event.dataset | groupby process.executable | groupby winlog.event_data.TargetObject | groupby process.executable winlog.event_data.TargetObject"},
{ "name": "Sysmon DNS", "description": "DNS queries captured by Sysmon", "query": "event.dataset:dns_query | groupby -sankey winlog.computer_name dns.query.name | groupby winlog.computer_name | groupby process.executable | groupby dns.query.name | groupby dns.answers.name"},
{ "name": "Sysmon Process", "description": "Process activity captured by Sysmon", "query": "(event.dataset:process_creation OR event.dataset:process_terminated OR event.dataset:process_access) | groupby -sankey winlog.computer_name user.name | groupby winlog.computer_name | groupby user.name | groupby event.dataset | groupby process.working_directory | groupby process.executable | groupby process.command_line | groupby process.parent.executable | groupby process.parent.command_line | groupby -sankey process.parent.executable process.executable"},
{ "name": "Sysmon File", "description": "File activity captured by Sysmon", "query": "(event.dataset:file_create OR event.dataset:file_create_stream_hash OR event.dataset:process_changed_file) | groupby -sankey winlog.computer_name process.executable | groupby winlog.computer_name | groupby event.dataset | groupby file.target | groupby process.executable"},
{ "name": "Sysmon Network", "description": "Network activity captured by Sysmon", "query": "event.dataset:network_connection | groupby -sankey winlog.computer_name destination.ip destination.port | groupby winlog.computer_name | groupby user.name | groupby process.executable | groupby source.ip | groupby destination.ip | groupby destination.port | groupby destination_geo.organization_name"},
{ "name": "Strelka", "description": "Strelka logs", "query": "event.module:strelka | groupby file.mime_type | groupby file.name | groupby file.source"},
{ "name": "Zeek Notice", "description": "Zeek Notice logs", "query": "event.dataset:notice | groupby notice.note | groupby notice.message | groupby notice.sub_message | groupby source.ip | groupby destination.ip | groupby destination.port"},
{ "name": "Connections", "description": "Connection logs", "query": "event.dataset:conn | groupby source.ip | groupby destination.ip | groupby destination.port | groupby network.protocol | groupby network.transport | groupby connection.history | groupby connection.state | groupby connection.state_description | groupby source.geo.country_name | groupby destination.geo.country_name | groupby client.ip_bytes | groupby server.ip_bytes"},

Binary file not shown.

Binary file not shown.

Binary file not shown.