SlideShare a Scribd company logo
大家好吗?大家好吗?
我 是我 是 Wim RemesWim Remes
比利时比利时
http://www.eurotrashsecurity.eu
http://www.twitter.com/eurotrashsec
Chris-John Riley, Craig Balding, Dale Pearson & me.
(shameless self-promotion)(shameless self-promotion)
今天的主题是今天的主题是
The value of open source
solutions in a
security infrastructure
AN
D
Infosec Technology
in the past decade
Pwned by a vendor ?
It's time to unleash the power ...
What can't you do with open
source solutions?
YES WE CAN !YES WE CAN !
It's about the bottom line.
Your bottom and Your line!
Open Source Security
A host-based intrusion detection system
Mr. Daniel CidMr. Daniel Cid
His royal OSSECnessHis royal OSSECness
http://www.twitter.comhttp://www.twitter.com/danielcid/danielcid
dcid in #ossec on irc.freenode.netdcid in #ossec on irc.freenode.net
OSSEC TechnicalOSSEC Technical
OverviewOverview
OSSEC Rollout ScenariosOSSEC Rollout Scenarios
OSSEC Rule engineOSSEC Rule engine
1
2
Host Based Intrusion DetectionHost Based Intrusion Detection
Client/Server ArchitectureClient/Server Architecture
Highly ScalableHighly Scalable
Cross PlatformCross Platform
Log AnalysisLog Analysis
Integrity CheckingIntegrity Checking
Rootkit DetectionRootkit Detection
Active ResponseActive Response
1
2
OSSEC Technical
Overview
If a tree falls in a forest, andIf a tree falls in a forest, and
nobody hears it, did it really fall?nobody hears it, did it really fall?
OSSEC
SERVER
1
2
syslog
syslog
ossec
OSSEC Technical
Overview
1
2
SIEM
OSSEC Rollout Scenarios
1
2
customer 1 customer 2
OSSEC Rollout Scenarios
And thy network shall be namedAnd thy network shall be named
BabelBabel
1
2
ANALYZE
PRE-DECODE
DECODE
LOG ALERT!
MSG
OSSEC Rule engine
1
2
AGENT
SERVER
ossec-logcollector
ossec-analysisd
ossec-maild ossec-execd
Compressed (zlib)
Encrypted (blowfish)
OSSEC Rule engine
Flexibility is the key word here!Flexibility is the key word here!
1
2
PRE-DECODING
Feb 24 10:12:23Feb 24 10:12:23 beijing appdaemon:stoppedbeijing appdaemon:stopped
time/datetime/date :: Feb 24 10:12:23Feb 24 10:12:23
HostnameHostname :: beijingbeijing
Program_nameProgram_name :: appdaemonappdaemon
LogLog :: stoppedstopped
OSSEC Rule engine
1
2
Feb 25 12:00:47 beijing appdaemon:userFeb 25 12:00:47 beijing appdaemon:user
john logged on from 10.10.10.10john logged on from 10.10.10.10
time/datetime/date :: Feb 25 12:00:47Feb 25 12:00:47
HostnameHostname :: beijingbeijing
Program_nameProgram_name :: appdaemonappdaemon
LogLog :: user john logged on from 10.10.10.10user john logged on from 10.10.10.10
PRE-DECODING
OSSEC Rule engine
1
2
time/datetime/date :: Feb 25 12:00:47Feb 25 12:00:47
HostnameHostname :: beijingbeijing
Program_nameProgram_name :: appdaemonappdaemon
LogLog :: user john logged on from 10.10.10.10user john logged on from 10.10.10.10
SrcipSrcip :: 10.10.10.1010.10.10.10
UserUser : john: john
DECODING
OSSEC Rule engine
Feb 25 12:00:47 beijing appdaemon:userFeb 25 12:00:47 beijing appdaemon:user
john logged on from 10.10.10.10john logged on from 10.10.10.10
1
2
<rule id=666 level=”0”><rule id=666 level=”0”>
<decoded_as><decoded_as>appdaemonappdaemon</decoded_as></decoded_as>
<description>appdaemon rule</description><description>appdaemon rule</description>
</rule></rule>
<rule id=”766” level=”5”><rule id=”766” level=”5”>
<if_sid>666</if_sid><if_sid>666</if_sid>
<match>^<match>^logged onlogged on</match></match>
<description>succesful logon</description><description>succesful logon</description>
</rule></rule>
ANALYSIS
OSSEC Rule engine
1
2
ANALYSIS
<rule id=866 level=”7”><rule id=866 level=”7”>
<if_sid>766</if_sid><if_sid>766</if_sid>
<hostname>^beijing</hostname><hostname>^beijing</hostname>
<srcip><srcip>!192.168.10.0/24!192.168.10.0/24</srcip></srcip>
<description>unauthorized logon!</description><description>unauthorized logon!</description>
</rule></rule>
<rule id=”966” level=”13”><rule id=”966” level=”13”>
<if_sid>766</if_sid><if_sid>766</if_sid>
<hostname>^shanghai</hostname><hostname>^shanghai</hostname>
<user><user>!john!john</user></user>
<description>unauthorised logon !</description><description>unauthorised logon !</description>
</rule></rule>
OSSEC Rule engine
1
2
ANALYSIS
666
766
866
966
OSSEC Rule engine
1
2
ANALYSIS
<rule id=1066 level=”7”><rule id=1066 level=”7”>
<if_sid>666</if_sid><if_sid>666</if_sid>
<match>^login failed</hostname><match>^login failed</hostname>
<description>failed login !</description><description>failed login !</description>
</rule></rule>
<rule id=”1166” level=”9”<rule id=”1166” level=”9” frequency=”10” timeframe=”100”frequency=”10” timeframe=”100”>>
<if_matched_sid>1066</if_matched_sid><if_matched_sid>1066</if_matched_sid>
<same_source_ip /><same_source_ip />
<description>Probable Brute Force !</description><description>Probable Brute Force !</description>
</rule></rule>
OSSEC Rule engine
1
2
AGENT
SERVER
ossec-logcollector
ossec-analysisd
ossec-maild ossec-execd
Compressed (zlib)
Encrypted (blowfish)
OSSEC Rule engine
Real GoodnessReal Goodness
1
2
666
766
866
966
1066
1166
STOP!
1
2
ossec.conf
command1
command2
command3
...
<active-response>
<command>command2</command>
<location>local</location>
<rules_id>1166</rules_id>
<timeout>600</timeout>
</active-response>
action1
action2
action3
...
<command>
<name>command2</name>
<executable>command2.sh</executable>
<expect>srcip</expect>
<timeout_allowed>yes</timeout_allowed>
</command>
1166
Real GoodnessReal Goodness
Open Source Security
谢谢谢谢
Thank youThank you
wim@remes-it.bewim@remes-it.be (mail)(mail)
blog.remes-it.be (blog)blog.remes-it.be (blog)
@wimremes (twitter)@wimremes (twitter)
#ossec (irc)#ossec (irc)

More Related Content

PDF
Fosdem10
PDF
OSSEC @ ISSA Jan 21st 2010
PPTX
BlueHat v17 || Mitigations for the Masses: From EMET to Windows Defender Exp...
PPTX
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
PPTX
Industroyer: biggest threat to industrial control systems since Stuxnet by An...
PPTX
Catching fileless attacks
PDF
Adaptive Defense - Understanding Cyber Attacks
PPTX
Breaking the cyber kill chain!
Fosdem10
OSSEC @ ISSA Jan 21st 2010
BlueHat v17 || Mitigations for the Masses: From EMET to Windows Defender Exp...
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
Industroyer: biggest threat to industrial control systems since Stuxnet by An...
Catching fileless attacks
Adaptive Defense - Understanding Cyber Attacks
Breaking the cyber kill chain!

What's hot (20)

PDF
BlueHat v18 || Malicious user profiling using a deep neural net
PPT
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
PDF
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
PPTX
Advanced OSSEC Training: Integration Strategies for Open Source Security
PDF
Testing Android Security Codemotion Amsterdam edition
PDF
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
PPTX
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
PDF
Docker Plugin For DevSecOps
PDF
DEF CON 23: Internet of Things: Hacking 14 Devices
PPTX
Living off the land and fileless attack techniques
KEY
Firefox Syncサーバーを建ててみた
PDF
BlueHat v18 || May i see your credentials, please
PDF
Avoiding damage, shame and regrets data protection for mobile client-server a...
PPTX
BlueHat v17 || Down the Open Source Software Rabbit Hole
PPTX
BlueHat v17 || Betraying the BIOS: Where the Guardians of the BIOS are Failing
PPTX
Anatomy of Exploit Kits
PDF
OSB220: What's New in Security Endpoint Manager
PDF
DrupalCamp London 2017 - Web site insecurity
PPTX
BlueHat v17 || Securing Windows Defender Application Guard
PDF
Whatever it takes - Fixing SQLIA and XSS in the process
BlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
Advanced OSSEC Training: Integration Strategies for Open Source Security
Testing Android Security Codemotion Amsterdam edition
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
Docker Plugin For DevSecOps
DEF CON 23: Internet of Things: Hacking 14 Devices
Living off the land and fileless attack techniques
Firefox Syncサーバーを建ててみた
BlueHat v18 || May i see your credentials, please
Avoiding damage, shame and regrets data protection for mobile client-server a...
BlueHat v17 || Down the Open Source Software Rabbit Hole
BlueHat v17 || Betraying the BIOS: Where the Guardians of the BIOS are Failing
Anatomy of Exploit Kits
OSB220: What's New in Security Endpoint Manager
DrupalCamp London 2017 - Web site insecurity
BlueHat v17 || Securing Windows Defender Application Guard
Whatever it takes - Fixing SQLIA and XSS in the process
Ad

Viewers also liked (20)

DOCX
Secure Abu Dhabi talk
PDF
Vinnes jayson koken
PDF
Distributed Denial Of Service Introduction
PDF
Build Your Own Incident Response
PDF
Crème Brulée :-)
PPTX
Intro to Malware Analysis
PDF
Blackhat Workshop
KEY
Morph V3.1
PDF
SIEM brown-bag presentation
PPT
Brucon presentation
PDF
The Future of Visualization
PDF
DAVIX - VizSec 2008
PPT
Visual Log Analysis - DefCon 2006
PPSX
Ahmed Anver Manatunga
PDF
DAVIX - Data Analysis and Visualization Linux
PDF
In the land of the blind the squinter rules
PDF
The Heatmap
 - Why is Security Visualization so Hard?
PPTX
Discover Synchronized Security - Sophos Day Netherlands
PDF
Visualization in the Age of Big Data
PDF
AfterGlow
Secure Abu Dhabi talk
Vinnes jayson koken
Distributed Denial Of Service Introduction
Build Your Own Incident Response
Crème Brulée :-)
Intro to Malware Analysis
Blackhat Workshop
Morph V3.1
SIEM brown-bag presentation
Brucon presentation
The Future of Visualization
DAVIX - VizSec 2008
Visual Log Analysis - DefCon 2006
Ahmed Anver Manatunga
DAVIX - Data Analysis and Visualization Linux
In the land of the blind the squinter rules
The Heatmap
 - Why is Security Visualization so Hard?
Discover Synchronized Security - Sophos Day Netherlands
Visualization in the Age of Big Data
AfterGlow
Ad

Similar to Open Source Security (20)

PPTX
Neo4j Import Webinar
PDF
Tools &amp; techniques, building a dev secops culture at mozilla sba live a...
PDF
Microservices, la risposta che (forse) cercavi!
PPTX
Securing your Cloud Environment v2
PPTX
Low Cost Tools for Security Challenges - Timothy De Block
PDF
Securing your Cloud Environment
PDF
Microservices in Production
PDF
Exploit Kit Cornucopia - Blackhat USA 2017
PDF
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
PDF
Microservices: 5 Things I Wish I'd Known - Code Motion Milan 2017
PDF
Vincent Kok - Microservices 5 things I wish I'd known - Codemotion Milan 2017
PPTX
New Microsoft PowerPoint Presentation (2).pptx
PDF
stackconf 2021 | Continuous Security – integrating security into your pipelines
PDF
Software Define your Current Storage with Opensource
PDF
iperfTZ: Understanding Network Bottlenecks for TrustZone-based Applications
PDF
No Apology Required: Deconstructing BB10
PDF
JSconf JP - Analysis of an exploited npm package. Event-stream's role in a su...
PDF
The 7 characteristics of container native infrastructure, LinuxCon/ContainerC...
PDF
Container Runtime Security with Falco
PPTX
2018 Writing Offensive .Net Tools
Neo4j Import Webinar
Tools &amp; techniques, building a dev secops culture at mozilla sba live a...
Microservices, la risposta che (forse) cercavi!
Securing your Cloud Environment v2
Low Cost Tools for Security Challenges - Timothy De Block
Securing your Cloud Environment
Microservices in Production
Exploit Kit Cornucopia - Blackhat USA 2017
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Microservices: 5 Things I Wish I'd Known - Code Motion Milan 2017
Vincent Kok - Microservices 5 things I wish I'd known - Codemotion Milan 2017
New Microsoft PowerPoint Presentation (2).pptx
stackconf 2021 | Continuous Security – integrating security into your pipelines
Software Define your Current Storage with Opensource
iperfTZ: Understanding Network Bottlenecks for TrustZone-based Applications
No Apology Required: Deconstructing BB10
JSconf JP - Analysis of an exploited npm package. Event-stream's role in a su...
The 7 characteristics of container native infrastructure, LinuxCon/ContainerC...
Container Runtime Security with Falco
2018 Writing Offensive .Net Tools

More from wremes (8)

PDF
Collaborate, Innovate, Secure
PDF
Data Driven Infosec Services
PDF
SOPA 4 dummies
PDF
And suddenly I see ... IDC IT Security Brussels 2011
PDF
10 things we're doing wrong with SIEM
PDF
Teaser
PDF
Ossec Lightning
ODP
Pareto chart using Openoffice.org
Collaborate, Innovate, Secure
Data Driven Infosec Services
SOPA 4 dummies
And suddenly I see ... IDC IT Security Brussels 2011
10 things we're doing wrong with SIEM
Teaser
Ossec Lightning
Pareto chart using Openoffice.org

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Machine learning based COVID-19 study performance prediction
PPT
Teaching material agriculture food technology
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
KodekX | Application Modernization Development
PDF
Electronic commerce courselecture one. Pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Unlocking AI with Model Context Protocol (MCP)
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Approach and Philosophy of On baking technology
Machine learning based COVID-19 study performance prediction
Teaching material agriculture food technology
Spectral efficient network and resource selection model in 5G networks
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KodekX | Application Modernization Development
Electronic commerce courselecture one. Pdf
Empathic Computing: Creating Shared Understanding
Review of recent advances in non-invasive hemoglobin estimation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Dropbox Q2 2025 Financial Results & Investor Presentation
MIND Revenue Release Quarter 2 2025 Press Release
Encapsulation_ Review paper, used for researhc scholars
Mobile App Security Testing_ A Comprehensive Guide.pdf

Open Source Security