SnortDLP - an open source DLP solution utilizing snort OverviewSnortDLP a.k.a. "Pig Pen" is an open source data loss prevention project that utilizes Snort to detect the exfiltration of sensitive data.FeaturesWeb based applicationWritten in PHP and utilizes a MySQL backend for cross operating system portabilityAdministrative login to protect unauthorized accessDetermines a unique fingerprint forfree textindividual documentseach document in a reposit..
OSSEC Log Management with Elasticsearch Log Management System ArchitectureThe OSSEC log management system I’ll discuss here relies on three open source technologies, in addition to OSSEC:Logstash – Parses and stores syslog data to ElasticsearchElasticsearch - General purpose indexing and data storage systemKibana – User interface that comes with ElasticSearchLogstash is configured to receive OSSEC syslog output then parse it and forwa..
OSSEC Server, Client, Web UI and Analogi Dashboard Installation tutorial OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response. It runs on most operating systems, including Linux, MacOS, Solaris, HP-UX, AIX and Windows. It also includes agentless monitoring for use with for example Cisco, HP or Juniper hardware.This tutorial covers..
Configuring OSSEC with MySQL and Analogi I have been using OSSEC for a while now but I always used only plain text logs. While this is not bad, it does not scale really well. I started looking into a way to do it right(tm). I knew OSSEC was compatible with MySQL, and since 2.7 has been released, it gave me an excuse to play with it again.You will need to enable MySQL in OSSEC (not enabled by default), grab the source then do the follow..
Testing Snort IDS with Metasploit vSploit Modules One of my key objectives for developing the new vSploit modules was to test network devices such as Snort. Snort or Sourcefire enterprise products are widely deployed in enterprises, so Snort can safely be considered the de-facto standard when it comes to intrusion detection systems (IDS). So much that even third-party intrusion detection systems often import Snort rules. Organizations are often..