#cybersecgirl tool tip:

Wazuh is a free and open source security solution that offers unified SIEM and XDR protection across several platforms. It is used for threat detection, prevention, and response.

Use it to protect networks, virtualized environments, containers, and cloud environments.

#cybersecgirl #infosec #cybersecurity #privacytechpro #opensource #wazuh

https://www.bleepingcomputer.com/news/security/wazuh-building-robust-cybersecurity-architecture-with-open-source-tools/

Reply to this note

Please Login to reply.

Discussion

Do you recommend Protonmail?

i do. love their self destructing email and password protected email options. they bought out simplelogin so paid plans get alias emails that you can receive AND send from. i'm also a fan of their active involement with the OpenPGP Working Group at the Internet Engineering Task Force (IETF).

""The result of this is the β€œcrypto refresh" of the OpenPGP standard, as it has been dubbed, has brought about modern authenticated encryption, more secure curves, memory-hard password hashing, and more."

that said, email is inherently not secure, but we all have to use it. i recommend using simplex or better yet, in-person communication for sensitive matters

I use Protonmail, I used to use Gmail when I wasnt educated about it. Then I got ads based on emails and I was like screw this

*use to πŸ˜‚

you had it right the first time πŸ˜‰

Oh yeah πŸ˜‚

yup, like when you notice gmail scaning your mail for booked flights etc and auto adding them to google calendar

So sexy

yes she is. how are things going with your home lab?

no need for details πŸ˜‰

Good so far. A Nmap scan and everything logs correctly. I haven’t done many projects yet other than testing.

I’m currently playing with custom firewall rules and seeing if I can improve upon the defaults. So far I’m not seeing anything major.

Next I may just setup traffic between the server and windows box for logging practice.

awesome πŸ€™πŸ»πŸ”₯

nostr:npub1f6ugxyxkknket3kkdgu4k0fu74vmshawermkj8d06sz6jts9t4kslazcka ok question.

Opened up a SSH connection and successful login from windows to server.

It registers on dashboard correctly and logged as low level 3 by rules.

Nice.

Next I am going to purposefully trigger higher 8-10 alarms with multiple incorrect logins, reverse lookups, etc.

After that I’m not sure what to look at. Any ideas on next steps of basic logging? Custom rules maybe?

check this out. it will get you going

https://piped.video/watch?v=3CaG2GI1kn0

He talks really fast. Makes me nervous

lol. that's networkchuck. he knows his stuff though, lots packed into a short video.

nmap 🫢

Id been looking for a package exactly like this. πŸ™

awesome. it's good stuff

The one I was about to go for was Greenbone - are you familiar with that one?

i am. they've been around a while. i'm not a fan of the interface. it's pretty old-school (i usually like old-school) but it's not super user-friendly imo.

Thanks for the input!

Oh networkchuck covered this? Nice!

Got first hand experience with it?

yes

Do you have any recommendations for a firewall for a desktop Linux system? I've been looking into an application based one, landed on OpenSnitch, but I don't know if I can trust it.

firewalld is what is installed by default, but seems like overkill and complicated. I do not have enough knowledge of Linux yet, just enough to get into trouble but not how to fix.

Did you find anything?

Seems like there's not a lot of choice for firewalls, especially app based ones. OpenSnitch is the only game in town. Happy to be wrong, would love alternatives.

I ended up learning more about firewalld for my situation, but far from ideal.

Mihari is a great free toolset for threat hunting or CTI to add to the SIEM/XDR. Supports several services.

https://GitHub.com/ninoseki/mihari

Yeah, Wazuh is great tool, it provides good visibility into your infrastructure. #Velociraptor is another example, but more useful for incident response and threat hunting in larger networks.

In top of that, network monitoring with IDS such as #suricata + ET Open signatures is useful addition especially for detect threats and anomalies originating from devices without wazuh installed. Analyzing traffic from IoT, guest laptops and smartphones and identification of all devices connected to the network is often very educative exercise.