Compare commits

..

101 Commits

Author SHA1 Message Date
Mike Reeves c949101d0f Merge pull request #10406 from Security-Onion-Solutions/dev
2.3.250
2023-05-22 15:14:23 -04:00
Mike Reeves 7c1f19b91f Merge pull request #10405 from Security-Onion-Solutions/2.3.250
2.3.250
2023-05-22 11:39:40 -04:00
Mike Reeves 598d6b025e 2.3.250 2023-05-22 11:37:13 -04:00
Jason Ertel 4d0d0714a5 Merge pull request #10401 from Security-Onion-Solutions/jertel/fixwhoisit
use the same requests version that's already packaged with the analyzer
2023-05-20 08:45:29 -04:00
Jason Ertel cb0c078955 use the same requests version that's already packaged with the analyzer 2023-05-19 23:56:39 -04:00
Jason Ertel aa426244bf Merge pull request #10394 from Security-Onion-Solutions/jertel/fixwhoisit
fix lib dependency issue with whoisit
2023-05-19 14:34:32 -04:00
Jason Ertel 97b2ae8d82 fix lib dependency issue with whoisit 2023-05-19 14:23:12 -04:00
Doug Burks 7047125759 Merge pull request #10386 from Security-Onion-Solutions/2.3/elastic-8.7.1
UPGRADE: Elastic 8.7.1 #10269
2023-05-18 15:27:10 -04:00
Doug Burks 43f73abd4d Update so-kibana-config-load 2023-05-18 15:18:27 -04:00
Doug Burks 51a8684850 Update config_saved_objects.ndjson 2023-05-18 15:17:36 -04:00
Doug Burks b3c5239787 Merge pull request #10333 from Security-Onion-Solutions/dougburks-patch-1
Update soup for 2.3.250
2023-05-11 08:28:53 -04:00
Doug Burks 0f562279ee Update soup for 2.3.250 2023-05-11 07:26:58 -04:00
weslambert 834f45c0f2 Merge pull request #10286 from Security-Onion-Solutions/fix/strelka_ignore_yara_rules
Ignore "expl_outlook_cve_2023_23397.yar" and "gen_mal_3cx_compromise_mar23.yar" since they are causing problems with YARA compilation
2023-05-08 11:58:11 -04:00
weslambert d4cf9efeca Merge pull request #10303 from Security-Onion-Solutions/fix/kibana_pivot_to_pcap_url
Surround _id field in double quotes to prevent errors associated with values beginning with a hyphen
2023-05-08 11:55:22 -04:00
Doug Burks c620983b4a Merge pull request #10299 from Security-Onion-Solutions/dougburks-patch-1
FIX: Improve soup's local file modification logic #8972
2023-05-08 09:47:49 -04:00
Wes ed19c139ea Surround _id field in double quotes to prevent errors associated with values beginning with a hyphen 2023-05-08 13:44:36 +00:00
Doug Burks af85c6261b FIX: Improve soup's local file modification logic #8972 2023-05-08 09:41:26 -04:00
weslambert e9f58269cd Ignore "expl_outlook_cve_2023_23397.yar" and "gen_mal_3cx_compromise_mar23.yar" since they are causing problems with YARA compilation 2023-05-04 16:13:59 -04:00
Jason Ertel 208c3d96e9 Merge pull request #10266 from Security-Onion-Solutions/jertel/aws
more detection improvements
2023-05-02 08:17:13 -04:00
Jason Ertel 1e888a5d9e more detection improvements 2023-05-02 07:56:11 -04:00
Jason Ertel f7ae8d449e Merge pull request #10259 from Security-Onion-Solutions/jertel/simplifycd
simplify cloud detection
2023-05-01 11:33:26 -04:00
Jason Ertel 195274bb11 Merge branch 'dev' into jertel/simplifycd 2023-05-01 11:29:39 -04:00
Jason Ertel a0ac1d2274 simplify cloud detection 2023-05-01 11:04:43 -04:00
Mike Reeves 3dd39c7f59 Merge pull request #10234 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update VERSION
2023-04-26 14:41:04 -04:00
Mike Reeves ba846bbf35 Update VERSION 2023-04-26 14:39:31 -04:00
Mike Reeves 0baf8e9471 Merge pull request #10227 from Security-Onion-Solutions/dev
2.3.240
2023-04-26 14:31:56 -04:00
Mike Reeves e30fec7af0 Merge pull request #10226 from Security-Onion-Solutions/2.3.240
2.3.240
2023-04-26 09:58:18 -04:00
Mike Reeves 884f5cd3a6 2.3.240 2023-04-26 09:55:19 -04:00
Jason Ertel 11babd2f1c Merge pull request #10221 from Security-Onion-Solutions/jertel/imdsv2to
timeout more quickly on aws imdsv2 detection
2023-04-26 07:59:13 -04:00
Jason Ertel b440ab5c02 timeout more quickly on aws imdsv2 detection 2023-04-26 07:57:23 -04:00
Jason Ertel 91d667c3ad Merge pull request #10200 from Security-Onion-Solutions/jertel/imdsv2_23
Detect cloud install on forced imdsv2 instances
2023-04-25 09:46:39 -04:00
Jason Ertel f04c01b28c Merge pull request #10204 from Security-Onion-Solutions/jertel/2.3.240_soup
soup update for 2.3.240
2023-04-25 09:46:28 -04:00
Jason Ertel 71ab8ddf1d soup update for 2.3.240 2023-04-25 09:42:14 -04:00
Jason Ertel f1f79d55dc Detect cloud install on forced imdsv2 instances 2023-04-24 16:26:23 -04:00
Mike Reeves db1bd16758 Merge pull request #10142 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update VERSION
2023-04-17 10:56:59 -04:00
Mike Reeves ef73834d58 Update VERSION 2023-04-17 10:55:38 -04:00
Mike Reeves 3891548d6d Merge pull request #10141 from Security-Onion-Solutions/dev
2.3.230 Release
2023-04-17 10:47:32 -04:00
Mike Reeves 9d6ed8b9b2 Merge pull request #10140 from Security-Onion-Solutions/2.3.230
2.3.230
2023-04-17 10:26:59 -04:00
Mike Reeves ef92815a08 2.3.230 2023-04-17 10:22:39 -04:00
Doug Burks 19b5cdcb0e Merge pull request #10119 from Security-Onion-Solutions/2.3/fix-suricata-dns
FIX: Suricata DNS A and CNAME parsing #10117
2023-04-13 11:00:13 -04:00
Doug Burks 272b345892 FIX: Suricata DNS A and CNAME parsing #10117 2023-04-13 10:52:37 -04:00
Mike Reeves 7fad9d60ef Merge pull request #10113 from Security-Onion-Solutions/TOoSmOotH-patch-4
Update init.sls
2023-04-12 10:32:43 -04:00
Mike Reeves 46fc62b8dc Update init.sls 2023-04-12 10:29:54 -04:00
Doug Burks ca9a93a4b0 Merge pull request #9998 from Security-Onion-Solutions/dougburks-patch-1
Update soup for 2.3.230
2023-03-24 12:38:39 -04:00
Doug Burks aa2e18fca9 Update soup for 2.3.230 2023-03-24 12:31:51 -04:00
Mike Reeves 7e4ce7b81d Merge pull request #9877 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update HOTFIX
2023-03-01 16:37:14 -05:00
Mike Reeves e5c0058dd1 Update HOTFIX 2023-03-01 16:36:08 -05:00
Mike Reeves 07c5b541a3 Merge pull request #9876 from Security-Onion-Solutions/master
Master to Dev
2023-03-01 16:35:48 -05:00
Mike Reeves b756b8ea32 Merge pull request #9873 from Security-Onion-Solutions/hotfix/2.3.220
Hotfix/2.3.220
2023-03-01 16:32:49 -05:00
Mike Reeves 5b46e57ae1 Merge pull request #9875 from Security-Onion-Solutions/hotfix23220
Hotfix for 2.3.220
2023-03-01 16:14:26 -05:00
Mike Reeves 924009afb8 Hotfix for 2.3.220 2023-03-01 16:11:38 -05:00
Mike Reeves 8f5bacc510 Merge pull request #9874 from Security-Onion-Solutions/TOoSmOotH-patch-3
Update init.sls
2023-03-01 14:52:04 -05:00
Mike Reeves d5e48a7eca Update init.sls 2023-03-01 14:50:55 -05:00
Mike Reeves 6346a92f0f Merge pull request #9872 from Security-Onion-Solutions/hotfix23220
Hotfix for 2.3.220
2023-03-01 14:20:47 -05:00
Mike Reeves 13a566a9a2 Hotfix for 2.3.220 2023-03-01 14:19:04 -05:00
Mike Reeves 063c6599d8 Hotfix for 2.3.220 2023-03-01 14:17:22 -05:00
weslambert 9fb315c99d Merge pull request #9870 from Security-Onion-Solutions/fix/curator_configuration_update_8.0.x
Update Curator configuration to align with requirements for Curator 8.0.x
2023-03-01 10:19:32 -05:00
Wes 6e0891e586 Update Curator configuration to align with requirements for Curator 8.0.x 2023-03-01 15:16:52 +00:00
Mike Reeves 3a96d59899 Merge pull request #9869 from Security-Onion-Solutions/TOoSmOotH-patch-2
Update HOTFIX
2023-03-01 10:10:47 -05:00
Mike Reeves 5fa945956e Update HOTFIX 2023-03-01 10:09:19 -05:00
Mike Reeves b0aab96cf5 Merge pull request #9858 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update VERSION
2023-02-27 09:40:39 -05:00
Mike Reeves 11def72790 Update VERSION 2023-02-27 09:39:52 -05:00
Mike Reeves 2ca2724a4c Merge pull request #9857 from Security-Onion-Solutions/dev
2.3.220
2023-02-27 09:35:14 -05:00
Mike Reeves 884883a225 Merge pull request #9856 from Security-Onion-Solutions/2.3.220
2.3.220
2023-02-27 09:26:28 -05:00
Mike Reeves 5c8ba3af65 2.3.220 2023-02-27 09:23:33 -05:00
Josh Brower 4b5d314adf Merge pull request #9833 from Security-Onion-Solutions/FleetDMConfigFix
Remove unsupported config option
2023-02-21 16:36:58 -05:00
Josh Brower 6e637f559c Remove unsupported config option 2023-02-21 16:35:11 -05:00
Doug Burks cc5304e9f7 Merge pull request #9806 from Security-Onion-Solutions/2.3/upgrade-elastic-8.6.2
2.3/upgrade elastic 8.6.2
2023-02-17 08:03:01 -05:00
Doug Burks 002403055d UPGRADE: Elastic 8.6.2 #9804 2023-02-17 07:04:57 -05:00
Doug Burks b80b80e825 UPGRADE: Elastic 8.6.2 #9804 2023-02-17 07:03:47 -05:00
Josh Brower c539d53a02 Merge pull request #9791 from Security-Onion-Solutions/fleetsapassword
Fix edge case
2023-02-15 15:30:49 -05:00
Josh Brower 3a22978c2b Fix password gen edge case 2023-02-15 15:25:35 -05:00
Doug Burks 5b1461e9a1 Merge pull request #9782 from Security-Onion-Solutions/dougburks-patch-1
Update soup for 2.3.220
2023-02-14 08:44:09 -05:00
Doug Burks 69f889dbd9 Update soup for 2.3.220 2023-02-14 08:42:35 -05:00
Josh Brower aefe1cceb8 Merge pull request #9758 from Security-Onion-Solutions/fleetupgrade
Fix link for FleetDM standalone nodes
2023-02-09 14:10:45 -05:00
Josh Brower b7e97eceb3 Fix link for FleetDM standalone nodes 2023-02-09 14:08:48 -05:00
Josh Brower 450e02e874 Merge pull request #9749 from Security-Onion-Solutions/fleetdm-fix
FleetDM Upgrade Fix
2023-02-09 09:30:22 -05:00
Josh Brower 09bebf08d6 Fix FleetDM SOC Link 2023-02-09 09:10:50 -05:00
Josh Brower 4dd54cea6c Use correct variable name 2023-02-08 16:58:47 -05:00
Josh Brower e07f4bd0ed Workaround for FleetDM PW Req 2023-02-08 13:03:33 -05:00
Mike Reeves 6adb586bb4 Merge pull request #9734 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update VERSION
2023-02-07 09:07:06 -05:00
Mike Reeves 2f99821736 Update VERSION 2023-02-07 09:05:16 -05:00
Mike Reeves db27c22158 Merge pull request #9730 from Security-Onion-Solutions/dev
2.3.210
2023-02-07 08:58:36 -05:00
Mike Reeves 2ff284fc7f Merge pull request #9729 from Security-Onion-Solutions/2.3.210
2.3.210
2023-02-06 16:36:06 -05:00
Mike Reeves 5d0a3ef205 2.3.210 2023-02-06 16:32:45 -05:00
Mike Reeves ac9c10dd3a 2.3.210 2023-02-06 15:46:27 -05:00
weslambert d4d67b545d Merge pull request #9699 from Security-Onion-Solutions/fix/strelka_yara_exclusion
Add 'configured_vulns_ext_vars.yar' to exclusion list
2023-02-01 14:38:29 -05:00
weslambert 2dced35800 Add 'configured_vulns_ext_vars.yar' to exclusion list 2023-02-01 14:24:20 -05:00
Josh Patterson c2a04a79c5 Merge pull request #9697 from Security-Onion-Solutions/23mysqlpy
23mysqlpy
2023-02-01 14:17:24 -05:00
m0duspwnens d43346a084 hold python mysql 2023-02-01 14:11:27 -05:00
m0duspwnens 0c4a27d120 lock python36-mysql-1.3.12-2.el7 version 2023-02-01 12:33:19 -05:00
Doug Burks b4530ffffe Merge pull request #9681 from Security-Onion-Solutions/fix/suricata-dhcp-parsing-2.3
2.3: Improve Suricata DHCP parsing and dashboard
2023-01-31 10:18:49 -05:00
Doug Burks d12aa0ed56 Move host.domain table to end of DHCP tables 2023-01-31 07:14:18 -05:00
Doug Burks 17bcf50ccb update Suricata DHCP parser to set server.address 2023-01-30 15:57:47 -05:00
Doug Burks 48401f6a3f Merge pull request #9675 from Security-Onion-Solutions/dougburks-patch-1
Update soup for 2.3.210
2023-01-30 09:17:47 -05:00
Doug Burks a96825f43e Update soup for 2.3.210 2023-01-30 09:16:00 -05:00
Doug Burks 2d48ae7bca Merge pull request #9656 from Security-Onion-Solutions/2.3/elastic-8.6.1
UPGRADE: Elastic 8.6.1 #9594 (2.3)
2023-01-26 16:24:33 -05:00
Doug Burks 0ff519ed2f Update to Elastic 8.6.1 2023-01-26 16:09:13 -05:00
Doug Burks 127533492f Update to Elastic 8.6.1 2023-01-26 16:08:15 -05:00
Mike Reeves 7d4b4a8bd4 Merge pull request #9585 from Security-Onion-Solutions/TOoSmOotH-patch-1
Update VERSION
2023-01-17 09:40:46 -05:00
Mike Reeves e9fa84d71b Update VERSION 2023-01-17 09:39:35 -05:00
27 changed files with 155 additions and 71 deletions
+1
View File
@@ -0,0 +1 @@
+11 -11
View File
@@ -1,18 +1,18 @@
### 2.3.200-20230113 ISO image built on 2023/01/13 ### 2.3.250-20230519 ISO image built on 2023/05/19
### Download and Verify ### Download and Verify
2.3.200-20230113 ISO image: 2.3.250-20230519 ISO image:
https://download.securityonion.net/file/securityonion/securityonion-2.3.200-20230113.iso https://download.securityonion.net/file/securityonion/securityonion-2.3.250-20230519.iso
MD5: 70291FFE925E2751559589E749B12164 MD5: EBECF635FB8CFDDD5C0559D01C14E215
SHA1: EFD3C7BA6F4EF6774F4F18ECD667A13F7FDF5CFF SHA1: 1C2BD45D080D6D99FD84C120827EA39817FCB078
SHA256: 7794C1325F9B72856FC2A47691F7E0292CA28976711A18F550163E3B58E7A401 SHA256: 748E9740077BCCAFDC67D15BA2D6A4B0539A29E4527715973E5BDDE5DCF565AD
Signature for ISO image: Signature for ISO image:
https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.200-20230113.iso.sig https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.250-20230519.iso.sig
Signing key: Signing key:
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS
@@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma
Download the signature file for the ISO: Download the signature file for the ISO:
``` ```
wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.200-20230113.iso.sig wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.250-20230519.iso.sig
``` ```
Download the ISO image: Download the ISO image:
``` ```
wget https://download.securityonion.net/file/securityonion/securityonion-2.3.200-20230113.iso wget https://download.securityonion.net/file/securityonion/securityonion-2.3.250-20230519.iso
``` ```
Verify the downloaded ISO image using the signature file: Verify the downloaded ISO image using the signature file:
``` ```
gpg --verify securityonion-2.3.200-20230113.iso.sig securityonion-2.3.200-20230113.iso gpg --verify securityonion-2.3.250-20230519.iso.sig securityonion-2.3.250-20230519.iso
``` ```
The output should show "Good signature" and the Primary key fingerprint should match what's shown below: The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
``` ```
gpg: Signature made Fri 13 Jan 2023 11:11:11 AM EST using RSA key ID FE507013 gpg: Signature made Sat 20 May 2023 09:16:02 AM EDT using RSA key ID FE507013
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>" gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
gpg: WARNING: This key is not certified with a trusted signature! gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner. gpg: There is no indication that the signature belongs to the owner.
+1 -1
View File
@@ -1 +1 @@
2.3.200 2.3.250
+1
View File
@@ -15,6 +15,7 @@ zeek:
SpoolDir: /nsm/zeek/spool SpoolDir: /nsm/zeek/spool
CfgDir: /opt/zeek/etc CfgDir: /opt/zeek/etc
CompressLogs: 1 CompressLogs: 1
ZeekPort: 27760
local: local:
'@load': '@load':
- misc/loaded-scripts - misc/loaded-scripts
+1 -2
View File
@@ -110,7 +110,6 @@ commonpkgs:
- libssl-dev - libssl-dev
- python3-dateutil - python3-dateutil
- python3-m2crypto - python3-m2crypto
- python3-mysqldb
- python3-packaging - python3-packaging
- python3-lxml - python3-lxml
- git - git
@@ -153,7 +152,6 @@ commonpkgs:
- python36-docker - python36-docker
- python36-dateutil - python36-dateutil
- python36-m2crypto - python36-m2crypto
- python36-mysql
- python36-packaging - python36-packaging
- python36-lxml - python36-lxml
- yum-utils - yum-utils
@@ -170,6 +168,7 @@ heldpackages:
- docker-ce: 3:20.10.5-3.el7 - docker-ce: 3:20.10.5-3.el7
- docker-ce-cli: 1:20.10.5-3.el7 - docker-ce-cli: 1:20.10.5-3.el7
- docker-ce-rootless-extras: 20.10.5-3.el7 - docker-ce-rootless-extras: 20.10.5-3.el7
- python36-mysql: 1.3.12-2.el7
- hold: True - hold: True
- update_holds: True - update_holds: True
{% endif %} {% endif %}
+6 -1
View File
@@ -53,8 +53,10 @@ if [[ $? -ne 0 ]]; then
exit 2 exit 2
fi fi
TEMPPW=$FLEET_SA_PW!
# Create New User # Create New User
CREATE_OUTPUT=$(docker exec so-fleet fleetctl user create --email $USER_EMAIL --name $USER_EMAIL --password $USER_PASS --global-role admin 2>&1) CREATE_OUTPUT=$(docker exec so-fleet fleetctl user create --email $USER_EMAIL --name $USER_EMAIL --password $TEMPPW --global-role admin 2>&1)
if [[ $? -eq 0 ]]; then if [[ $? -eq 0 ]]; then
echo "Successfully added user to Fleet" echo "Successfully added user to Fleet"
@@ -64,6 +66,9 @@ else
exit 2 exit 2
fi fi
# Reset New User Password to user supplied password
echo "$USER_PASS" | so-fleet-user-update "$USER_EMAIL"
# Disable forced password reset # Disable forced password reset
MYSQL_OUTPUT=$(docker exec so-mysql mysql -u root --password=$MYSQL_PW fleet -e \ MYSQL_OUTPUT=$(docker exec so-mysql mysql -u root --password=$MYSQL_PW fleet -e \
"UPDATE users SET admin_forced_password_reset = 0 WHERE email = '$USER_EMAIL'" 2>&1) "UPDATE users SET admin_forced_password_reset = 0 WHERE email = '$USER_EMAIL'" 2>&1)
+62 -1
View File
@@ -212,7 +212,7 @@ check_local_mods() {
if [[ -f $default_file ]]; then if [[ -f $default_file ]]; then
file_diff=$(diff "$default_file" "$local_file" ) file_diff=$(diff "$default_file" "$local_file" )
if [[ ! " ${local_ignore_arr[*]} " =~ " ${local_file} " ]]; then if [[ ! " ${local_ignore_arr[*]} " =~ " ${local_file} " ]]; then
if [[ $(echo "$file_diff" | grep -c "^<") -gt 0 ]]; then if [[ $(echo "$file_diff" | grep -Ec "^[<>]") -gt 0 ]]; then
local_mod_arr+=( "$local_file" ) local_mod_arr+=( "$local_file" )
fi fi
fi fi
@@ -552,6 +552,12 @@ preupgrade_changes() {
[[ "$INSTALLEDVERSION" == 2.3.181 ]] && up_to_2.3.182 [[ "$INSTALLEDVERSION" == 2.3.181 ]] && up_to_2.3.182
[[ "$INSTALLEDVERSION" == 2.3.182 ]] && up_to_2.3.190 [[ "$INSTALLEDVERSION" == 2.3.182 ]] && up_to_2.3.190
[[ "$INSTALLEDVERSION" == 2.3.190 ]] && up_to_2.3.200 [[ "$INSTALLEDVERSION" == 2.3.190 ]] && up_to_2.3.200
[[ "$INSTALLEDVERSION" == 2.3.200 ]] && up_to_2.3.210
[[ "$INSTALLEDVERSION" == 2.3.210 ]] && up_to_2.3.220
[[ "$INSTALLEDVERSION" == 2.3.220 ]] && up_to_2.3.230
[[ "$INSTALLEDVERSION" == 2.3.230 ]] && up_to_2.3.240
[[ "$INSTALLEDVERSION" == 2.3.240 ]] && up_to_2.3.250
true true
} }
@@ -576,6 +582,11 @@ postupgrade_changes() {
[[ "$POSTVERSION" == 2.3.181 ]] && post_to_2.3.182 [[ "$POSTVERSION" == 2.3.181 ]] && post_to_2.3.182
[[ "$POSTVERSION" == 2.3.182 ]] && post_to_2.3.190 [[ "$POSTVERSION" == 2.3.182 ]] && post_to_2.3.190
[[ "$POSTVERSION" == 2.3.190 ]] && post_to_2.3.200 [[ "$POSTVERSION" == 2.3.190 ]] && post_to_2.3.200
[[ "$POSTVERSION" == 2.3.200 ]] && post_to_2.3.210
[[ "$POSTVERSION" == 2.3.210 ]] && post_to_2.3.220
[[ "$POSTVERSION" == 2.3.220 ]] && post_to_2.3.230
[[ "$POSTVERSION" == 2.3.230 ]] && post_to_2.3.240
[[ "$POSTVERSION" == 2.3.240 ]] && post_to_2.3.250
true true
} }
@@ -699,6 +710,31 @@ post_to_2.3.200() {
POSTVERSION=2.3.200 POSTVERSION=2.3.200
} }
post_to_2.3.210() {
echo "Nothing to do for .210"
POSTVERSION=2.3.210
}
post_to_2.3.220() {
echo "Nothing to do for .220"
POSTVERSION=2.3.220
}
post_to_2.3.230() {
echo "Nothing to do for .230"
POSTVERSION=2.3.230
}
post_to_2.3.240() {
echo "Nothing to do for .240"
POSTVERSION=2.3.240
}
post_to_2.3.250() {
echo "Nothing to do for .250"
POSTVERSION=2.3.250
}
stop_salt_master() { stop_salt_master() {
# kill all salt jobs across the grid because the hang indefinitely if they are queued and salt-master restarts # kill all salt jobs across the grid because the hang indefinitely if they are queued and salt-master restarts
set +e set +e
@@ -1029,6 +1065,31 @@ up_to_2.3.200() {
INSTALLEDVERSION=2.3.200 INSTALLEDVERSION=2.3.200
} }
up_to_2.3.210() {
echo "Upgrading to 2.3.210"
INSTALLEDVERSION=2.3.210
}
up_to_2.3.220() {
echo "Upgrading to 2.3.220"
INSTALLEDVERSION=2.3.220
}
up_to_2.3.230() {
echo "Upgrading to 2.3.230"
INSTALLEDVERSION=2.3.230
}
up_to_2.3.240() {
echo "Upgrading to 2.3.240"
INSTALLEDVERSION=2.3.240
}
up_to_2.3.250() {
echo "Upgrading to 2.3.250"
INSTALLEDVERSION=2.3.250
}
verify_upgradespace() { verify_upgradespace() {
CURRENTSPACE=$(df -BG / | grep -v Avail | awk '{print $4}' | sed 's/.$//') CURRENTSPACE=$(df -BG / | grep -v Avail | awk '{print $4}' | sed 's/.$//')
if [ "$CURRENTSPACE" -lt "10" ]; then if [ "$CURRENTSPACE" -lt "10" ]; then
+17 -14
View File
@@ -14,22 +14,25 @@
--- ---
# Remember, leave a key empty if there is no value. None will be a string, # Remember, leave a key empty if there is no value. None will be a string,
# not a Python "NoneType" # not a Python "NoneType"
client: elasticsearch:
hosts: client:
- {{elasticsearch}} hosts:
port: 9200 - https://{{elasticsearch}}:9200
cloud_id:
ca_certs:
client_cert:
client_key:
verify_certs: False
request_timeout: 30
other_settings:
api_key:
id:
api_key:
master_only: False
{%- if salt['pillar.get']('elasticsearch:auth:enabled') is sameas true %} {%- if salt['pillar.get']('elasticsearch:auth:enabled') is sameas true %}
username: "{{ ES_USER }}" username: "{{ ES_USER }}"
password: "{{ ES_PASS }}" password: "{{ ES_PASS }}"
{%- endif %} {%- endif %}
url_prefix:
use_ssl: True
certificate:
client_cert:
client_key:
ssl_no_validate: True
timeout: 30
master_only: False
logging: logging:
loglevel: INFO loglevel: INFO
+2
View File
@@ -139,6 +139,8 @@ so-curator:
- file: actionconfs - file: actionconfs
- file: curconf - file: curconf
- file: curlogdir - file: curlogdir
- watch:
- file: curconf
{% else %} {% else %}
- force: True - force: True
{% endif %} {% endif %}
+11 -9
View File
@@ -1,15 +1,17 @@
{ {
"description" : "suricata.dhcp", "description" : "suricata.dhcp",
"processors" : [ "processors" : [
{ "rename": { "field": "message2.proto", "target_field": "network.transport", "ignore_missing": true } }, { "rename": { "field": "message2.proto", "target_field": "network.transport", "ignore_missing": true } },
{ "rename": { "field": "message2.app_proto", "target_field": "network.protocol", "ignore_missing": true } }, { "rename": { "field": "message2.app_proto", "target_field": "network.protocol", "ignore_missing": true } },
{ "rename": { "field": "message2.dhcp.assigned_ip", "target_field": "dhcp.assigned_ip", "ignore_missing": true } }, { "rename": { "field": "message2.dhcp.assigned_ip", "target_field": "dhcp.assigned_ip", "ignore_missing": true } },
{ "rename": { "field": "message2.dhcp.client_ip", "target_field": "client.address", "ignore_missing": true } }, { "rename": { "field": "message2.dhcp.client_ip", "target_field": "client.address", "ignore_missing": true } },
{ "rename": { "field": "message2.dhcp.client_mac", "target_field": "host.mac", "ignore_missing": true } }, { "rename": { "field": "message2.dhcp.client_mac", "target_field": "host.mac", "ignore_missing": true } },
{ "rename": { "field": "message2.dhcp.dhcp_type", "target_field": "dhcp.message_types", "ignore_missing": true } }, { "rename": { "field": "message2.dhcp.dhcp_type", "target_field": "dhcp.message_types", "ignore_missing": true } },
{ "rename": { "field": "message2.dhcp.hostname", "target_field": "host.hostname", "ignore_missing": true } }, { "rename": { "field": "message2.dhcp.hostname", "target_field": "host.hostname", "ignore_missing": true } },
{ "rename": { "field": "message2.dhcp.type", "target_field": "dhcp.type", "ignore_missing": true } }, { "rename": { "field": "message2.dhcp.type", "target_field": "dhcp.type", "ignore_missing": true } },
{ "rename": { "field": "message2.dhcp.id", "target_field": "dhcp.id", "ignore_missing": true } }, { "rename": { "field": "message2.dhcp.id", "target_field": "dhcp.id", "ignore_missing": true } },
{ "set": { "if": "ctx.dhcp?.type == 'request'", "field": "server.address", "value": "{{destination.ip}}" } },
{ "set": { "if": "ctx.dhcp?.type == 'reply'", "field": "server.address", "value": "{{source.ip}}" } },
{ "pipeline": { "name": "common" } } { "pipeline": { "name": "common" } }
] ]
} }
+16 -16
View File
@@ -1,21 +1,21 @@
{ {
"description" : "suricata.dns", "description" : "suricata.dns",
"processors" : [ "processors" : [
{ "rename": { "field": "message2.proto", "target_field": "network.transport", "ignore_missing": true } }, { "rename": { "field": "message2.proto", "target_field": "network.transport", "ignore_missing": true } },
{ "rename": { "field": "message2.app_proto", "target_field": "network.protocol", "ignore_missing": true } }, { "rename": { "field": "message2.app_proto", "target_field": "network.protocol", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.type", "target_field": "dns.query.type", "ignore_missing": true } }, { "rename": { "field": "message2.dns.type", "target_field": "dns.query.type", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.tx_id", "target_field": "dns.id", "ignore_missing": true } }, { "rename": { "field": "message2.dns.tx_id", "target_field": "dns.id", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.version", "target_field": "dns.version", "ignore_missing": true } }, { "rename": { "field": "message2.dns.version", "target_field": "dns.version", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.rrname", "target_field": "dns.query.name", "ignore_missing": true } }, { "rename": { "field": "message2.dns.rrname", "target_field": "dns.query.name", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.rrtype", "target_field": "dns.query.type_name", "ignore_missing": true } }, { "rename": { "field": "message2.dns.rrtype", "target_field": "dns.query.type_name", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.flags", "target_field": "dns.flags", "ignore_missing": true } }, { "rename": { "field": "message2.dns.flags", "target_field": "dns.flags", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.qr", "target_field": "dns.qr", "ignore_missing": true } }, { "rename": { "field": "message2.dns.qr", "target_field": "dns.qr", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.rd", "target_field": "dns.recursion.desired", "ignore_missing": true } }, { "rename": { "field": "message2.dns.rd", "target_field": "dns.recursion.desired", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.ra", "target_field": "dns.recursion.available", "ignore_missing": true } }, { "rename": { "field": "message2.dns.ra", "target_field": "dns.recursion.available", "ignore_missing": true } },
{ "rename": { "field": "message2.dns.rcode", "target_field": "dns.response.code_name", "ignore_missing": true } }, { "rename": { "field": "message2.dns.rcode", "target_field": "dns.response.code_name", "ignore_missing": true } },
{ "rename": { "field": "message2.grouped.A", "target_field": "dns.answers.data", "ignore_missing": true } }, { "rename": { "field": "message2.dns.grouped.A", "target_field": "dns.answers.data", "ignore_missing": true } },
{ "rename": { "field": "message2.grouped.CNAME", "target_field": "dns.answers.name", "ignore_missing": true } }, { "rename": { "field": "message2.dns.grouped.CNAME", "target_field": "dns.answers.name", "ignore_missing": true } },
{ "pipeline": { "if": "ctx.dns.query?.name != null && ctx.dns.query.name.contains('.')", "name": "dns.tld" } }, { "pipeline": { "if": "ctx.dns.query?.name != null && ctx.dns.query.name.contains('.')", "name": "dns.tld" } },
{ "pipeline": { "name": "common" } } { "pipeline": { "name": "common" } }
] ]
} }
@@ -26,9 +26,6 @@ spec:
distributed_tls_write_endpoint: /api/v1/osquery/distributed/write distributed_tls_write_endpoint: /api/v1/osquery/distributed/write
enable_windows_events_publisher: true enable_windows_events_publisher: true
enable_windows_events_subscriber: true enable_windows_events_subscriber: true
logger_plugin: tls
logger_tls_endpoint: /api/v1/osquery/log
logger_tls_period: 10
pack_delimiter: _ pack_delimiter: _
host_settings: host_settings:
enable_software_inventory: false enable_software_inventory: false
+1 -1
View File
@@ -59,7 +59,7 @@ update() {
IFS=$'\r\n' GLOBIGNORE='*' command eval 'LINES=($(cat $1))' IFS=$'\r\n' GLOBIGNORE='*' command eval 'LINES=($(cat $1))'
for i in "${LINES[@]}"; do for i in "${LINES[@]}"; do
RESPONSE=$({{ ELASTICCURL }} -X PUT "localhost:5601/api/saved_objects/config/8.5.3" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d " $i ") RESPONSE=$({{ ELASTICCURL }} -X PUT "localhost:5601/api/saved_objects/config/8.7.1" -H 'kbn-xsrf: true' -H 'Content-Type: application/json' -d " $i ")
echo $RESPONSE; if [[ "$RESPONSE" != *"\"success\":true"* ]] && [[ "$RESPONSE" != *"updated_at"* ]] ; then RETURN_CODE=1;fi echo $RESPONSE; if [[ "$RESPONSE" != *"\"success\":true"* ]] && [[ "$RESPONSE" != *"updated_at"* ]] ; then RETURN_CODE=1;fi
done done
@@ -1 +1 @@
{"attributes": {"buildNum": 39457,"defaultIndex": "2289a0c0-6970-11ea-a0cd-ffa0f6a1bc29","defaultRoute": "/app/dashboards#/view/a8411b30-6d03-11ea-b301-3d6c35840645","discover:sampleSize": 100,"theme:darkMode": true,"timepicker:timeDefaults": "{\n \"from\": \"now-24h\",\n \"to\": \"now\"\n}"},"coreMigrationVersion": "8.5.3","id": "8.5.3","migrationVersion": {"config": "7.13.0"},"references": [],"type": "config","updated_at": "2021-10-10T10:10:10.105Z","version": "WzI5NzUsMl0="} {"attributes": {"buildNum": 39457,"defaultIndex": "2289a0c0-6970-11ea-a0cd-ffa0f6a1bc29","defaultRoute": "/app/dashboards#/view/a8411b30-6d03-11ea-b301-3d6c35840645","discover:sampleSize": 100,"theme:darkMode": true,"timepicker:timeDefaults": "{\n \"from\": \"now-24h\",\n \"to\": \"now\"\n}"},"coreMigrationVersion": "8.7.1","id": "8.7.1","migrationVersion": {"config": "7.13.0"},"references": [],"type": "config","updated_at": "2021-10-10T10:10:10.105Z","version": "WzI5NzUsMl0="}
File diff suppressed because one or more lines are too long
+1 -1
View File
@@ -319,7 +319,7 @@ http {
{%- if fleet_node %} {%- if fleet_node %}
location /fleet/ { location /fleet/ {
return 307 https://{{ fleet_ip }}/fleet; return 307 https://{{ fleet_ip }}/fleet/dashboard;
} }
{%- else %} {%- else %}
@@ -1 +1,2 @@
requests==2.27.1
whoisit>=2.5.3 whoisit>=2.5.3
+1 -1
View File
@@ -15,7 +15,7 @@
{ "name": "Zeek Notice", "description": "Zeek notice logs", "query": "event.dataset:notice | groupby -sankey notice.note destination.ip | groupby notice.note | groupby notice.message | groupby notice.sub_message | groupby source.ip | groupby destination.ip | groupby destination.port | groupby destination_geo.organization_name"}, { "name": "Zeek Notice", "description": "Zeek notice logs", "query": "event.dataset:notice | groupby -sankey notice.note destination.ip | groupby notice.note | groupby notice.message | groupby notice.sub_message | groupby source.ip | groupby destination.ip | groupby destination.port | groupby destination_geo.organization_name"},
{ "name": "Connections", "description": "Network connection metadata", "query": "event.dataset:conn | groupby source.ip | groupby destination.ip | groupby destination.port | groupby -sankey destination.port network.protocol | groupby network.protocol | groupby network.transport | groupby connection.history | groupby connection.state | groupby connection.state_description | groupby source.geo.country_name | groupby destination.geo.country_name | groupby client.ip_bytes | groupby server.ip_bytes | groupby client.oui"}, { "name": "Connections", "description": "Network connection metadata", "query": "event.dataset:conn | groupby source.ip | groupby destination.ip | groupby destination.port | groupby -sankey destination.port network.protocol | groupby network.protocol | groupby network.transport | groupby connection.history | groupby connection.state | groupby connection.state_description | groupby source.geo.country_name | groupby destination.geo.country_name | groupby client.ip_bytes | groupby server.ip_bytes | groupby client.oui"},
{ "name": "DCE_RPC", "description": "DCE_RPC (Distributed Computing Environment / Remote Procedure Calls) network metadata", "query": "event.dataset:dce_rpc | groupby -sankey dce_rpc.endpoint dce_rpc.operation | groupby dce_rpc.endpoint | groupby dce_rpc.operation | groupby dce_rpc.named_pipe | groupby source.ip | groupby destination.ip | groupby destination.port | groupby destination_geo.organization_name"}, { "name": "DCE_RPC", "description": "DCE_RPC (Distributed Computing Environment / Remote Procedure Calls) network metadata", "query": "event.dataset:dce_rpc | groupby -sankey dce_rpc.endpoint dce_rpc.operation | groupby dce_rpc.endpoint | groupby dce_rpc.operation | groupby dce_rpc.named_pipe | groupby source.ip | groupby destination.ip | groupby destination.port | groupby destination_geo.organization_name"},
{ "name": "DHCP", "description": "DHCP (Dynamic Host Configuration Protocol) leases", "query": "event.dataset:dhcp | groupby host.hostname | groupby host.domain | groupby dhcp.message_types | groupby -sankey client.address server.address | groupby client.address | groupby server.address"}, { "name": "DHCP", "description": "DHCP (Dynamic Host Configuration Protocol) leases", "query": "event.dataset:dhcp | groupby host.hostname | groupby dhcp.message_types | groupby -sankey client.address server.address | groupby client.address | groupby server.address | groupby host.domain"},
{ "name": "DNS", "description": "DNS (Domain Name System) queries", "query": "event.dataset:dns | groupby dns.query.name | groupby dns.highest_registered_domain | groupby dns.parent_domain | groupby -sankey source.ip destination.ip | groupby dns.answers.name | groupby dns.query.type_name | groupby dns.response.code_name | groupby source.ip | groupby destination.ip | groupby destination.port | groupby destination_geo.organization_name"}, { "name": "DNS", "description": "DNS (Domain Name System) queries", "query": "event.dataset:dns | groupby dns.query.name | groupby dns.highest_registered_domain | groupby dns.parent_domain | groupby -sankey source.ip destination.ip | groupby dns.answers.name | groupby dns.query.type_name | groupby dns.response.code_name | groupby source.ip | groupby destination.ip | groupby destination.port | groupby destination_geo.organization_name"},
{ "name": "DPD", "description": "DPD (Dynamic Protocol Detection) errors", "query": "event.dataset:dpd | groupby error.reason | groupby network.protocol | groupby -sankey source.ip destination.ip | groupby source.ip | groupby destination.ip | groupby destination.port | groupby destination_geo.organization_name"}, { "name": "DPD", "description": "DPD (Dynamic Protocol Detection) errors", "query": "event.dataset:dpd | groupby error.reason | groupby network.protocol | groupby -sankey source.ip destination.ip | groupby source.ip | groupby destination.ip | groupby destination.port | groupby destination_geo.organization_name"},
{ "name": "Files", "description": "Files seen in network traffic", "query": "event.dataset:file | groupby file.mime_type | groupby -sankey file.mime_type file.source | groupby file.source | groupby file.bytes.total | groupby source.ip | groupby destination.ip | groupby destination_geo.organization_name"}, { "name": "Files", "description": "Files seen in network traffic", "query": "event.dataset:file | groupby file.mime_type | groupby -sankey file.mime_type file.source | groupby file.source | groupby file.bytes.total | groupby source.ip | groupby destination.ip | groupby destination_geo.organization_name"},
+2 -2
View File
@@ -3,6 +3,6 @@
{ "name": "toolGrafana", "description": "toolGrafanaHelp", "icon": "fa-external-link-alt", "target": "so-grafana", "link": "/grafana/d/so_overview" }, { "name": "toolGrafana", "description": "toolGrafanaHelp", "icon": "fa-external-link-alt", "target": "so-grafana", "link": "/grafana/d/so_overview" },
{ "name": "toolCyberchef", "description": "toolCyberchefHelp", "icon": "fa-external-link-alt", "target": "so-cyberchef", "link": "/cyberchef/" }, { "name": "toolCyberchef", "description": "toolCyberchefHelp", "icon": "fa-external-link-alt", "target": "so-cyberchef", "link": "/cyberchef/" },
{ "name": "toolPlaybook", "description": "toolPlaybookHelp", "icon": "fa-external-link-alt", "target": "so-playbook", "link": "/playbook/projects/detection-playbooks/issues/" }, { "name": "toolPlaybook", "description": "toolPlaybookHelp", "icon": "fa-external-link-alt", "target": "so-playbook", "link": "/playbook/projects/detection-playbooks/issues/" },
{ "name": "toolFleet", "description": "toolFleetHelp", "icon": "fa-external-link-alt", "target": "so-fleet", "link": "/fleet/" }, { "name": "toolFleet", "description": "toolFleetHelp", "icon": "fa-external-link-alt", "target": "so-fleet", "link": "/fleet/dashboard" },
{ "name": "toolNavigator", "description": "toolNavigatorHelp", "icon": "fa-external-link-alt", "target": "so-navigator", "link": "/navigator/" } { "name": "toolNavigator", "description": "toolNavigatorHelp", "icon": "fa-external-link-alt", "target": "so-navigator", "link": "/navigator/" }
] ]
+3
View File
@@ -16,3 +16,6 @@ strelka:
- gen_sign_anomalies.yar - gen_sign_anomalies.yar
- gen_susp_xor.yar - gen_susp_xor.yar
- gen_webshells_ext_vars.yar - gen_webshells_ext_vars.yar
- configured_vulns_ext_vars.yar
- expl_outlook_cve_2023_23397.yar
- gen_mal_3cx_compromise_mar23.yar
+14 -5
View File
@@ -145,7 +145,7 @@ analyst_salt_local() {
securityonion_repo securityonion_repo
gpg_rpm_import gpg_rpm_import
# Install salt # Install salt
logCmd "yum -y install salt-minion-3004.2 httpd-tools python3 python36-docker python36-dateutil python36-m2crypto python36-mysql python36-packaging python36-lxml yum-utils device-mapper-persistent-data lvm2 openssl jq" logCmd "yum -y install salt-minion-3004.2 httpd-tools python3 python36-docker python36-dateutil python36-m2crypto python36-mysql-1.3.12-2.el7.x86_64 python36-packaging python36-lxml yum-utils device-mapper-persistent-data lvm2 openssl jq"
logCmd "yum -y update --exclude=salt*" logCmd "yum -y update --exclude=salt*"
salt-call state.apply workstation --local --file-root=../salt/ -l info 2>&1 | tee -a outfile salt-call state.apply workstation --local --file-root=../salt/ -l info 2>&1 | tee -a outfile
@@ -1123,8 +1123,17 @@ create_repo() {
} }
detect_cloud() { detect_cloud() {
echo "Testing if setup is running on a cloud instance..." | tee -a "$setup_log" echo "Testing if setup is running on a cloud instance..." | tee -a "$setup_log"
if ( curl --fail -s -m 5 http://169.254.169.254/latest/meta-data/instance-id > /dev/null ) || ( dmidecode -s bios-vendor | grep -q Google > /dev/null) || [ -f /var/log/waagent.log ]; then export is_cloud="true"; fi if dmidecode -s bios-version | grep -q amazon || \
dmidecode -s bios-vendor | grep -q Amazon || \
dmidecode -s bios-vendor | grep -q Google || \
[ -f /var/log/waagent.log ]; then
echo "Detected a cloud installation." | tee -a "$setup_log"
export is_cloud="true"
else
echo "This does not appear to be a cloud installation." | tee -a "$setup_log"
fi
} }
detect_os() { detect_os() {
@@ -1511,7 +1520,7 @@ generate_passwords(){
PLAYBOOKADMINPASS=$(get_random_value) PLAYBOOKADMINPASS=$(get_random_value)
PLAYBOOKAUTOMATIONPASS=$(get_random_value) PLAYBOOKAUTOMATIONPASS=$(get_random_value)
FLEETPASS=$(get_random_value) FLEETPASS=$(get_random_value)
FLEETSAPASS=$(get_random_value) FLEETSAPASS="$(get_random_value)!1"
FLEETJWT=$(get_random_value) FLEETJWT=$(get_random_value)
GRAFANAPASS=$(get_random_value) GRAFANAPASS=$(get_random_value)
SENSORONIKEY=$(get_random_value) SENSORONIKEY=$(get_random_value)
@@ -2291,7 +2300,7 @@ saltify() {
fi fi
set_progress_str 8 'Installing salt-minion & python modules' set_progress_str 8 'Installing salt-minion & python modules'
if [[ ! ( $is_iso || $is_analyst_iso ) ]]; then if [[ ! ( $is_iso || $is_analyst_iso ) ]]; then
logCmd "yum -y install salt-minion-3004.2 httpd-tools python3 python36-docker python36-dateutil python36-m2crypto python36-mysql python36-packaging python36-lxml yum-utils device-mapper-persistent-data lvm2 openssl jq" logCmd "yum -y install salt-minion-3004.2 httpd-tools python3 python36-docker python36-dateutil python36-m2crypto python36-mysql-1.3.12-2.el7.x86_64 python36-packaging python36-lxml yum-utils device-mapper-persistent-data lvm2 openssl jq"
logCmd "yum -y update --exclude=salt*" logCmd "yum -y update --exclude=salt*"
fi fi
logCmd "systemctl enable salt-minion" logCmd "systemctl enable salt-minion"
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.