In the last writeup we were able to generate logs based on file change. But that does not help us much because we again have to monitor every single machine in the environment manually which is impossible. It is certainly better if we can centralize all the logs into a single dashboard. As ELK one of the common tool to search and visualize data, we can transfer logs using Logstash to Elastic and eventually view them in Kibana dashboard.
In this article we will look into how we can use osquery to check the integrity of the filesystem of FIM. FIM is File Integrity Monitoring which monitors the changes in the filesystem. Usually when a attacker is inside a victim’s machine, the victim will certainly will try to download some scripts/programs to the victims machine so that the attacker can perform privilege escalation. This is valuable if you are searching for movement of any adversary in a system.
I have always wanted to use osquery and checkout the capabliity so what I can understand how it can help me identifyting aversaries in my environment. But to do that, first I needed to understand how it all works. In the post, I will be installing osquery and checking out its power and how it can assist me in protecting my environment. Follow the steps below to perform the installation of osqueryi in virtual machine with following:
I have used gitlab for quite a while as it provides me with quite some flexibility and have some additional advantages over it’s competitor github. I usually use public / private key authentication to push my codes onto the server. but after a fresh installation, I saw the following error when trying to work with gitlab. $ git clone email@example.com:nuclearpasta/vehiclebooking.git Cloning into 'vehiclebooking'... firstname.lastname@example.org: Permission denied (publickey). fatal: Could not read from remote repository.