Auto Remove Malware With Wazuh Active Response! - Let's Build a Host Intrusion Detection System

Поделиться
HTML-код
  • Опубликовано: 12 сен 2024
  • Join me as we incorporate Active Response to remove any file with a positive VirusTotal hit! Let's deploy a Host Intrusion Detection System and SIEM with free open source tools. Join me as we explore and learn together.
    Github Repo: github.com/Ope...
    Defend with us on Slack: bit.ly/2Pi1byt
    Check us out: www.opensecure...
    Interact with our demo: www.opensecure...
    Hire us: www.opensecure...

Комментарии • 43

  • @Huelilik
    @Huelilik 2 года назад

    where did the removed virus go? where will he be quarantined?
    Your class is amazing, I hope you open a class on a platform like udemy , surely your class will be very popular

  • @mochammadawaludin2073
    @mochammadawaludin2073 2 года назад

    hi, why still can't act the proses of remove virus package when already finish a download...?
    but log already started on wazuh no error

  • @tndgray
    @tndgray 2 года назад

    Hey man! Love your videos. Do you have a video or have one planned that covers active response for windows systems? Everything out there seems to be geared towards Linux.

    • @taylorwalton_socfortress
      @taylorwalton_socfortress  2 года назад

      Hey there, yes looking to bring more active response with windows soon. However, in the below video, I used active response with wazuh to call a powershell script and could help as an example: ruclips.net/video/dFHfH_f47Ms/видео.html

  • @cyberlancer718
    @cyberlancer718 Год назад

    Superb will this script work on windows? What will be changes needed?

  • @hussainblackdrag1983
    @hussainblackdrag1983 Год назад

    how i can do the same thing for windows agent?

  • @yelnikcm111
    @yelnikcm111 2 года назад

    Thanks for doing these videos but I am not getting this to work. I have done the full instructions step by step with no success. I am not even getting alerts when the file is downloaded. Would the latest version change the information you have in the video?

    • @taylorwalton_socfortress
      @taylorwalton_socfortress  2 года назад

      Hey there, did you make sure the real time monitoring was enabled on the directory you are downloading the file to? Below is an example of the "opt" directory:
      /opt

  • @watchkeeper4531
    @watchkeeper4531 3 года назад

    Hi OpenSecure, I am able to detect the Virus downloaded from the site but active response isnt working. Are we able to setup a slack sometime to go through?

    • @taylorwalton_socfortress
      @taylorwalton_socfortress  3 года назад

      Hey Watchkeeper, I do not have slack but you can join the discord server and get assistance there: discord.gg/MzkFP9yE9V

  • @shijieteosj
    @shijieteosj 3 года назад

    Thanks for the guide, been following your entire guide on Wazuh and it has been going great. However, for this section, VirusTotal found a malicious file and triggered Rule 87105. However, there still appears to be no deletion of the file or any signs of the bash script running. Any suggestions on what I could change?

    • @taylorwalton_socfortress
      @taylorwalton_socfortress  3 года назад

      Hey Peinrpple, have you made sure to add the active response block within the ossec.conf file?
      Let me know and thanks for watching!

    • @shijieteosj
      @shijieteosj 3 года назад

      @@taylorwalton_socfortress Yep, have added the active response block at ossec.conf already. Active response for blocking attackers like in video #7 works, but not for this.

    • @taylorwalton_socfortress
      @taylorwalton_socfortress  3 года назад

      @@shijieteosj Do you see any entries on the wazuh agent within the /var/ossec/logs/active-responses.log....if not, are permissions and ownership for the bash scripts set correctly on the wazuh manager and wazuh agent?

    • @shijieteosj
      @shijieteosj 3 года назад

      @@taylorwalton_socfortress The active responses log on the agent is unfortunately empty. As for the bash scripts, they have been set to +x permissions, with owners being root:ossec

  • @saketbande9727
    @saketbande9727 3 года назад

    @OpenSecure Sir, i followed each and every step but i did not get active response

    • @taylorwalton_socfortress
      @taylorwalton_socfortress  3 года назад +1

      Hey Saket, Do you see active response attempt to run? Have a look at the /var/ossec/logs/activeresponse.log file on the manager and the agent and let me know what entries are within those files. For faster help, join us on our Discord server and hopefully us and the community can help you out!
      discord.gg/MzkFP9yE9V
      Thanks for watching

  • @waleedjamali8372
    @waleedjamali8372 2 года назад

    Great work. I have done all the steps accordingly but in my case active response is not working.

    • @taylorwalton_socfortress
      @taylorwalton_socfortress  2 года назад

      Hey Waleed, are you seeing the positive virustotal alert?

    • @waleedjamali8372
      @waleedjamali8372 2 года назад

      @@taylorwalton_socfortress yes I can see the file added and then the positive alert from virustotal but the rest is not working

  • @thezubairrahim
    @thezubairrahim 3 года назад

    Thanks for uploading. I followed your steps but it does not work for me. the virustotal found file malicious successfully but not deleting it. I don't know where is the problem?

    • @taylorwalton_socfortress
      @taylorwalton_socfortress  3 года назад

      Hey Zubair, what does your active response settings look like? You may need to include the Active Response tag.

    • @thezubairrahim
      @thezubairrahim 3 года назад

      @@taylorwalton_socfortress I already did that which wazuh version you are using?

    • @taylorwalton_socfortress
      @taylorwalton_socfortress  3 года назад

      @@thezubairrahim 4.1.5. If you run the the remove.sh by itself what is the output you get?

    • @SimoneScanavini
      @SimoneScanavini 3 года назад

      @@taylorwalton_socfortress Hi, same problem here, it says: ossec-integratord: ERROR: Couldn't execute command (/var/ossec/integrations/custom-remove-threat /tmp/custom-remove-threat-1626733235--779629725.alert > /dev/null 2>&1). Check file and permissions. But permissions are set to root:ossec

    • @taylorwalton_socfortress
      @taylorwalton_socfortress  3 года назад

      @@SimoneScanavini Hey Simone, is the remove-threat script also an executable? This is done with the "chmod +x /var/ossec/integrations/custom-remove-threat" command

  • @Ne0_Vect0r
    @Ne0_Vect0r 3 года назад

    this sounds great, but what about the performance?

    • @taylorwalton_socfortress
      @taylorwalton_socfortress  3 года назад +1

      Hey Neo, while this is a great addition there are a few catches. First we are depending on VirusTotal's API service to be running and accessible from our Wazuh Manager. A break in internet connectivity would cause a timeout error or a break within our wazuh-manager would allow the malicious software, script, etc to run. Second VirusTotal has the ability to limit the number of API request you make per day. You can pay for the ability to submit more requests as you need but if you exceed your per day limit, they will deny future requests. Third, although the API calls are fast, depending on the actions of the malicious file, exe, bin, etc., it could still have time to execute before the Wazuh-Manager has made the request to Virustotal, gotten back the response, determined the file is malicious, and sends the active response command to the agent. By no means does this replace a dedicated antivirus solution but is a great other defense tactic we can implement. I plan an exploring dedicated opensource antivirus solutions in future videos so please stay tuned. Thanks for watching :)

  • @karlmaamary8181
    @karlmaamary8181 3 года назад

    Hello, I am getting logs from VirusTotal but the active response is not working

    • @taylorwalton_socfortress
      @taylorwalton_socfortress  3 года назад

      Hey Karl, what rule ID do you have setup for active response? Are you seeing any output from the /var/ossec/logs/activeresponse.log?

    • @karlmaamary8181
      @karlmaamary8181 3 года назад

      @@taylorwalton_socfortress This is my config:
      custom-remove-threat
      87105
      json

      remove-threat
      remove-threat.sh
      filename
      no
      no
      remove-threat
      local
      I also tried to add the in the active response tag but it did not make any difference. I followed all your steps and made all the configuration needed on the agent too. I'm having trouble trying to figure out where is the problem. Is there something I need to do to activate the active response?
      As for the outputs from the /var/ossec/logs/active-responses.log, I'm only getting the restart.sh

    • @taylorwalton_socfortress
      @taylorwalton_socfortress  3 года назад

      Hey Karl, apologies for the late reply.
      One thing to verify is working correctly is the VirusTotal integration. This needs to be working because rule id 87105 will only trigger once VirusTotal responds back to our API request that the file we uploaded has a positive match. Without that rule id being triggered, our custom-remove-threat process will not be triggered.
      Once you can ensure the Virustotal calls are working as expected, we can troubleshoot further. Looking forward to your response.

    • @karlmaamary8181
      @karlmaamary8181 3 года назад

      @@taylorwalton_socfortress The rule id 87105 triggers when I download a malicious file but sometimes the rule id 87104 is the one that triggers. I don't know if that is normal.

    • @taylorwalton_socfortress
      @taylorwalton_socfortress  3 года назад

      @@karlmaamary8181 Hey Karl, I expect that to be normal. What OS is your wazuh-agent? Do you see any errors if you run the /var/ossec/active-response/bin/remove-threat.sh on the agent side?