20250513-notes
This commit is contained in:
96
.obsidian/workspace.json
vendored
96
.obsidian/workspace.json
vendored
@@ -37,7 +37,7 @@
|
|||||||
"state": {
|
"state": {
|
||||||
"type": "markdown",
|
"type": "markdown",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "diary/2025-05-12.md",
|
"file": "diary/2025-05-13.md",
|
||||||
"mode": "source",
|
"mode": "source",
|
||||||
"source": true,
|
"source": true,
|
||||||
"backlinks": true,
|
"backlinks": true,
|
||||||
@@ -52,83 +52,11 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"icon": "lucide-file",
|
"icon": "lucide-file",
|
||||||
"title": "2025-05-12"
|
"title": "2025-05-13"
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "86c29268ca41e5b5",
|
|
||||||
"type": "leaf",
|
|
||||||
"state": {
|
|
||||||
"type": "markdown",
|
|
||||||
"state": {
|
|
||||||
"file": "projects/ssr/20250508-Zertifikate-einspielen.md",
|
|
||||||
"mode": "source",
|
|
||||||
"source": true,
|
|
||||||
"backlinks": true,
|
|
||||||
"backlinkOpts": {
|
|
||||||
"collapseAll": false,
|
|
||||||
"extraContext": false,
|
|
||||||
"sortOrder": "alphabetical",
|
|
||||||
"showSearch": false,
|
|
||||||
"searchQuery": "",
|
|
||||||
"backlinkCollapsed": false,
|
|
||||||
"unlinkedCollapsed": true
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"icon": "lucide-file",
|
|
||||||
"title": "20250508-Zertifikate-einspielen"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "9561e0ce96909fdd",
|
|
||||||
"type": "leaf",
|
|
||||||
"state": {
|
|
||||||
"type": "markdown",
|
|
||||||
"state": {
|
|
||||||
"file": "projects/patryk-projekt/202503012-initial.md",
|
|
||||||
"mode": "source",
|
|
||||||
"source": true,
|
|
||||||
"backlinks": true,
|
|
||||||
"backlinkOpts": {
|
|
||||||
"collapseAll": false,
|
|
||||||
"extraContext": false,
|
|
||||||
"sortOrder": "alphabetical",
|
|
||||||
"showSearch": false,
|
|
||||||
"searchQuery": "",
|
|
||||||
"backlinkCollapsed": false,
|
|
||||||
"unlinkedCollapsed": true
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"icon": "lucide-file",
|
|
||||||
"title": "202503012-initial"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "9700bd7cccc0bbf4",
|
|
||||||
"type": "leaf",
|
|
||||||
"state": {
|
|
||||||
"type": "markdown",
|
|
||||||
"state": {
|
|
||||||
"file": "projects/patryk-projekt/20250512-gemma-planning.md",
|
|
||||||
"mode": "preview",
|
|
||||||
"source": true,
|
|
||||||
"backlinks": true,
|
|
||||||
"backlinkOpts": {
|
|
||||||
"collapseAll": false,
|
|
||||||
"extraContext": false,
|
|
||||||
"sortOrder": "alphabetical",
|
|
||||||
"showSearch": false,
|
|
||||||
"searchQuery": "",
|
|
||||||
"backlinkCollapsed": false,
|
|
||||||
"unlinkedCollapsed": true
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"icon": "lucide-file",
|
|
||||||
"title": "20250512-gemma-planning"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"currentTab": 4
|
"currentTab": 1
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"direction": "vertical"
|
"direction": "vertical"
|
||||||
@@ -304,16 +232,20 @@
|
|||||||
"templater-obsidian:Templater": false
|
"templater-obsidian:Templater": false
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"active": "9700bd7cccc0bbf4",
|
"active": "b865e0663684cf60",
|
||||||
"lastOpenFiles": [
|
"lastOpenFiles": [
|
||||||
"projects/patryk-projekt/202503012-initial.md",
|
|
||||||
"projects/ssr/20250508-Zertifikate-einspielen.md",
|
|
||||||
"projects/patryk-projekt/20250512-gemma-planning.md",
|
"projects/patryk-projekt/20250512-gemma-planning.md",
|
||||||
"projects/patryk-projekt/20250319-projekt-berschreibung.md",
|
"projects/patryk-projekt/202503012-initial.md",
|
||||||
|
"diary/2025-05-13.md",
|
||||||
|
"projects/ssr/20250508-Zertifikate-einspielen.md",
|
||||||
|
"projects/sbx/sbx-lab-network.md",
|
||||||
"diary/2025-05-12.md",
|
"diary/2025-05-12.md",
|
||||||
|
"projects/OPNsense/STANDARDS/possible-impovements.md",
|
||||||
|
"projects/discopharma/20250320-manual-project.md",
|
||||||
|
"projects/patryk-projekt/20250512-gemma-planning.tex",
|
||||||
|
"projects/patryk-projekt/20250319-projekt-berschreibung.md",
|
||||||
"diary/2025-05-09.md",
|
"diary/2025-05-09.md",
|
||||||
"diary/2025-05-08.md",
|
"diary/2025-05-08.md",
|
||||||
"projects/OPNsense/STANDARDS/possible-impovements.md",
|
|
||||||
"projects/OPNsense/STANDARDS/Monthly-Time.md",
|
"projects/OPNsense/STANDARDS/Monthly-Time.md",
|
||||||
"projects/OPNsense/STANDARDS/Feature-Capability.md",
|
"projects/OPNsense/STANDARDS/Feature-Capability.md",
|
||||||
"projects/sbx/meetings/20250506-saulius-meetup.md",
|
"projects/sbx/meetings/20250506-saulius-meetup.md",
|
||||||
@@ -330,11 +262,8 @@
|
|||||||
"projects/sbx/manuals/Sophos-SG_PPPoE-data.md",
|
"projects/sbx/manuals/Sophos-SG_PPPoE-data.md",
|
||||||
"projects/w&h-Projekt/20250430-ap-in-garten.md",
|
"projects/w&h-Projekt/20250430-ap-in-garten.md",
|
||||||
"diary/2025-04-29.md",
|
"diary/2025-04-29.md",
|
||||||
"projects/kwa/firewall_migration/20250317_first-meeting.md",
|
|
||||||
"projects/w&h-Projekt",
|
"projects/w&h-Projekt",
|
||||||
"diary/2025-04-30.md",
|
|
||||||
"projects/OPNsense/Schulungen/Untitled",
|
"projects/OPNsense/Schulungen/Untitled",
|
||||||
"projects/OPNsense/unknown/opnsense-proposal-draft.md",
|
|
||||||
"projects/OPNsense/STANDARDS",
|
"projects/OPNsense/STANDARDS",
|
||||||
"projects/OPNsense/unknown",
|
"projects/OPNsense/unknown",
|
||||||
"archive/APSA",
|
"archive/APSA",
|
||||||
@@ -342,7 +271,6 @@
|
|||||||
"projects/win10_2_win11",
|
"projects/win10_2_win11",
|
||||||
"projects/sbx/manuals",
|
"projects/sbx/manuals",
|
||||||
"projects/ssr/202504-4architekten",
|
"projects/ssr/202504-4architekten",
|
||||||
"projects/sbx/firewall-std",
|
|
||||||
"files/discopharma/discopharma-infra.drawio.png"
|
"files/discopharma/discopharma-infra.drawio.png"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@@ -17,6 +17,7 @@ $i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\
|
|||||||
- [ ] Firewall Migration - mache Termin mit ssr aus. frage nina vorher ob noetig
|
- [ ] Firewall Migration - mache Termin mit ssr aus. frage nina vorher ob noetig
|
||||||
- [ ] MS Teams nicht mehr unterstuetzt unter MacOS<=13
|
- [ ] MS Teams nicht mehr unterstuetzt unter MacOS<=13
|
||||||
- [ ] Domaenen umziehen
|
- [ ] Domaenen umziehen
|
||||||
|
- [ ] m365 migration: Max sein Thema
|
||||||
|
|
||||||
### Todo
|
### Todo
|
||||||
|
|
||||||
@@ -27,7 +28,14 @@ $i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\
|
|||||||
- 09:00 - 09:30: Gespraech mit Patryk, Kaffee machen, Sortieren, Planen
|
- 09:00 - 09:30: Gespraech mit Patryk, Kaffee machen, Sortieren, Planen
|
||||||
- 09:30 - 10:00: Ticketpflege
|
- 09:30 - 10:00: Ticketpflege
|
||||||
- 10:00 - 10:15: Pause
|
- 10:00 - 10:15: Pause
|
||||||
- 10:15 - 10:45: Patryk Projekt Planung
|
- 10:15 - 11:00: Patryk Projekt Planung
|
||||||
|
- 11:00 - 11:30: blocherer schule. AP nicht angebunden
|
||||||
|
- 11:45 - 12:45: Pause
|
||||||
|
- 13:15 - 14:15: Meeting mit Patryk
|
||||||
|
- 14:15 - 14:30: Nina schreiben wegen der Firewall Migration
|
||||||
|
- 14:30 - 14:45: Wazuh Installationsmethode lernen
|
||||||
|
- 14:45 - 15:15: SSR Zertifikate einspielen, Zertifikate Format anpassen und Passwortschutz entfernen
|
||||||
|
- 15:15 - 17:15: Patryk: Wazuh Server installieren und VM fuer Wazuh Agent installieren, Win11 Test VM fuer Patryk installieren, Wazuh testweise anschauen
|
||||||
|
|
||||||
## todo
|
## todo
|
||||||
|
|
||||||
|
|||||||
64
diary/2025-05-13.md
Normal file
64
diary/2025-05-13.md
Normal file
@@ -0,0 +1,64 @@
|
|||||||
|
$i\hbar \frac{\partial}{\partial t} \Large{|}\psi \Large{>} = \hat{H} \Large{|}\psi \Large{>}$
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
### SSR offene Themen
|
||||||
|
|
||||||
|
- [ ] Firewall Migration - mache Termin mit ssr aus. frage nina vorher ob noetig
|
||||||
|
- [ ] MS Teams nicht mehr unterstuetzt unter MacOS<=13
|
||||||
|
- [ ] Domaenen umziehen
|
||||||
|
- [ ] m365 migration: Max sein Thema
|
||||||
|
|
||||||
|
## Timestamps
|
||||||
|
|
||||||
|
- 08:00 - 08:30: MacOS Update
|
||||||
|
- 08:30 - 08:45: Gespraech mit Saulius zu seiner Matrix
|
||||||
|
- 08:45 - 09:15: [x] KWA: Kristina kann kein Ticket erstellen und sie kann einer benoetigten Gruppe nicht beitreten, Pruefe M365 dashboard auf Berechtigungen fuer das Postfach 635, Gespraech mit Michael zu Ninja Agent Fehler
|
||||||
|
- 09:15 - 09:45: [x] Kontakt zu Kristina Franzl, Postfach einbinden, Test Ticket erstellen
|
||||||
|
- 09:45 - 10:00: Private Planung
|
||||||
|
- 10:00 - 11:30: Saulius Matrix und Profil
|
||||||
|
- 12:00 - 13:00: Pause
|
||||||
|
- 13:00 - 14:00: SSR zertifikate einspielen: firewall, mail server, filewave, nas/synology, mailstore, ldap server; nas update
|
||||||
|
- 14:00 - 14:30: Lebenslauf fuer Saulius erweitern
|
||||||
|
- 14:30 - 14:40: ILo Lizenz bei NeoSphere einspielen fuer ubt03
|
||||||
|
- 14:40 - 15:00: Gespraech mit Sebastian
|
||||||
|
- 15:00 - 15:30:
|
||||||
|
|
||||||
|
## Monday
|
||||||
|
|
||||||
|
- 09:00 - 09:30: Gespraech mit Patryk, Kaffee machen, Sortieren, Planen
|
||||||
|
- 09:30 - 10:00: Ticketpflege
|
||||||
|
- 10:00 - 10:15: Pause
|
||||||
|
- 10:15 - 11:00: Patryk Projekt Planung
|
||||||
|
- 11:00 - 11:30: blocherer schule. AP nicht angebunden
|
||||||
|
- 11:45 - 12:45: Pause
|
||||||
|
- 13:15 - 14:15: Meeting mit Patryk
|
||||||
|
- 14:15 - 14:30: Nina schreiben wegen der Firewall Migration
|
||||||
|
- 14:30 - 14:45: Wazuh Installationsmethode lernen
|
||||||
|
- 14:45 - 15:15: SSR Zertifikate einspielen, Zertifikate Format anpassen und Passwortschutz entfernen
|
||||||
|
- 15:15 - 17:15: Patryk: Wazuh Server installieren und VM fuer Wazuh Agent installieren, Win11 Test VM fuer Patryk installieren, Wazuh testweise anschauen
|
||||||
|
|
||||||
|
## todo
|
||||||
|
|
||||||
|
### General
|
||||||
|
|
||||||
|
- [ ] Liste erstellen aller Projekte, die es gibt und neuem Mitarbeiter vorstellen
|
||||||
|
- [ ] handout fuer jeweils sophos und opnsense als vergleich
|
||||||
|
|
||||||
|
- [ ] verbraucherzentrale cybercns ueberpruefung - kw ab dem 16.01 wegen baldiger sicherheitspruefung
|
||||||
|
|
||||||
|
- [=] filewave - integrate new admin user - integrated in filewave - need to be tested and then deployed on all macs
|
||||||
|
- [ ] kwa/ssr snmp karten fuer usv
|
||||||
|
- [ ] update filewave admin und central
|
||||||
|
|
||||||
|
### SBX
|
||||||
|
|
||||||
|
- [ ] backup on external drive for pve.lab.softbox.net
|
||||||
|
|
||||||
|
- [ ] check if possible to monitor vsphere passwd expiration
|
||||||
|
- [ ] create obsidian templates (Meetings, People, )
|
||||||
|
- [ ] sbx - opsreportcard summary for action plan
|
||||||
|
|
||||||
|
- [ ] fuege bharchitekten zu connectsecure hinzu
|
||||||
|
- [ ] erstelle connectsecure report fuer grasslfing
|
||||||
BIN
files/.DS_Store
vendored
BIN
files/.DS_Store
vendored
Binary file not shown.
@@ -1,3 +1,12 @@
|
|||||||
|
---
|
||||||
|
title: "Wazuh - Patryk Chrostowski"
|
||||||
|
author: Petar Cubela
|
||||||
|
date: May 12, 2025
|
||||||
|
geometry: margin=1.5cm
|
||||||
|
output: pdf_document
|
||||||
|
---
|
||||||
|
|
||||||
|
## Gemma
|
||||||
|
|
||||||
### USER
|
### USER
|
||||||
I am a project supporter for a trainee which is working on his final project.
|
I am a project supporter for a trainee which is working on his final project.
|
||||||
|
|||||||
502
projects/patryk-projekt/20250512-gemma-planning.tex
Normal file
502
projects/patryk-projekt/20250512-gemma-planning.tex
Normal file
@@ -0,0 +1,502 @@
|
|||||||
|
\subsection{Gemma}\label{gemma}
|
||||||
|
|
||||||
|
\subsubsection{USER}\label{user}
|
||||||
|
|
||||||
|
I am a project supporter for a trainee which is working on his final
|
||||||
|
project.\\
|
||||||
|
The project studies the implementation and evaluation of the open source
|
||||||
|
security solution, \href{https://documentation.wazuh.com/}{Wazuh}.\\
|
||||||
|
\textbf{Study the documentation via a Web Search before answering.}
|
||||||
|
|
||||||
|
The project has to be completed in a time span of two weeks (10 work
|
||||||
|
days).
|
||||||
|
|
||||||
|
For our hardware base we have a computer with 32 GB of RAM and a strong
|
||||||
|
enough CPU.\\
|
||||||
|
Outline the project planning; this is a template for the project
|
||||||
|
goals:\\
|
||||||
|
1. Implement Wazuh in a test environment. The base infrastructure has to
|
||||||
|
be build and prepared. (Which OS?, Infrastructure scheme for the Wazuh
|
||||||
|
agent, manager and alerting systems)\\
|
||||||
|
2. Implementation of penetration tests and potential attack scenarios
|
||||||
|
(brute-force-attacks, port-scanning and exploits and weaknesses)\\
|
||||||
|
3. Analysis of Wazuh's reaction. (Real time monitoring and alerting,
|
||||||
|
automatic defense mechanisms, Logging and Reporting)\\
|
||||||
|
4. Optimization of Wazuh and Security policies.\\
|
||||||
|
5. Piratical importance and use in the industry
|
||||||
|
|
||||||
|
Think about the time scheduling and difficulties in the project.
|
||||||
|
|
||||||
|
\subsubsection{ASSISTANT}\label{assistant}
|
||||||
|
|
||||||
|
Okay, let's map out a project plan for your trainee's Wazuh final
|
||||||
|
project. Considering the two-week (10 workdays) timeframe, a Proxmox
|
||||||
|
base, and the scope you're outlining, we need to be realistic and
|
||||||
|
prioritize. This outline balances project goals with achievable
|
||||||
|
milestones within the time constraint. I'll provide a detailed schedule
|
||||||
|
with estimated time commitments and potential pitfalls.
|
||||||
|
|
||||||
|
\textbf{Overall Strategy:} We're going to aim for a \emph{functional}
|
||||||
|
implementation with a strong foundation for further exploration. We
|
||||||
|
won't necessarily cover \emph{every} feature of Wazuh in detail, but we
|
||||||
|
will demonstrate core functionality and build a platform for the trainee
|
||||||
|
to learn more. Documenting each step thoroughly is crucial, not just for
|
||||||
|
the project itself, but also for the trainee's learning.
|
||||||
|
|
||||||
|
\textbf{1. Infrastructure \& Base Build (Days 1-2 -- High Priority)}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Operating System Choice:} Ubuntu Server 22.04 LTS is a solid
|
||||||
|
choice. It's widely supported, has excellent Wazuh compatibility, and
|
||||||
|
is familiar to many Linux users. Debian is also excellent, but
|
||||||
|
Ubuntu's larger community and readily available resources often make
|
||||||
|
troubleshooting easier.
|
||||||
|
\item
|
||||||
|
\textbf{Proxmox VM Configuration:}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Manager VM:} Minimum 4GB RAM (6-8GB is better for future
|
||||||
|
expansion), 2 vCPUs. Allocate enough disk space (50GB+) for logs and
|
||||||
|
Wazuh data.
|
||||||
|
\item
|
||||||
|
\textbf{Agent VM (at least 2-3 for testing):} 2GB RAM is typically
|
||||||
|
sufficient. Allocate 20-30GB of disk space.
|
||||||
|
\end{itemize}
|
||||||
|
\item
|
||||||
|
\textbf{Infrastructure Scheme:}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Manager (Centralized):} This VM hosts the Wazuh manager
|
||||||
|
components: \texttt{wazuh-manager}, \texttt{wazuh-logtest},
|
||||||
|
\texttt{wazuh-api}, and database (Elasticsearch is standard).
|
||||||
|
\item
|
||||||
|
\textbf{Agents (Distributed):} These VMs are the targets of Wazuh
|
||||||
|
monitoring. They run the \texttt{wazuh-agent} process. Ideally,
|
||||||
|
these should represent different ``typical'' workloads: a web
|
||||||
|
server, a database server (if possible), and maybe a desktop
|
||||||
|
environment.
|
||||||
|
\item
|
||||||
|
\textbf{Alerting:} We'll leverage Wazuh's built-in alerting
|
||||||
|
mechanism (email, Syslog). We're not setting up a dedicated external
|
||||||
|
SIEM in this timeframe.
|
||||||
|
\end{itemize}
|
||||||
|
\item
|
||||||
|
\textbf{Task Breakdown (Days 1-2):}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Day 1:} Proxmox setup, Manager VM creation \& basic
|
||||||
|
configuration (network, hostname, time).
|
||||||
|
\item
|
||||||
|
\textbf{Day 1.5:} Agent VM creation (at least 2, more if time
|
||||||
|
allows).
|
||||||
|
\item
|
||||||
|
\textbf{Day 2:} Install and configure Wazuh Manager components on
|
||||||
|
the Manager VM. Initial agent deployment. \emph{Key: Get at least
|
||||||
|
one agent reporting successfully to the manager.}
|
||||||
|
\end{itemize}
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
\textbf{2. Penetration Tests \& Attack Scenarios (Days 3-5 -- Medium
|
||||||
|
Priority)}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Focus on Fundamentals:} Don't try to do everything. Pick 2-3
|
||||||
|
realistic scenarios that demonstrate Wazuh's capabilities.
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Scenario 1: Brute-Force SSH:} Simple to execute,
|
||||||
|
demonstrates authentication monitoring.
|
||||||
|
\item
|
||||||
|
\textbf{Scenario 2: Port Scanning (Nmap):} Demonstrates detection of
|
||||||
|
reconnaissance activity. Make sure the firewall rules don't block
|
||||||
|
the manager, so Wazuh can detect the scan.
|
||||||
|
\item
|
||||||
|
\textbf{Scenario 3: Exploiting a Vulnerable Service (e.g.,
|
||||||
|
vulnerable web server):} Requires more setup but showcases
|
||||||
|
vulnerability detection (if Wazuh's rules are configured to cover
|
||||||
|
it, otherwise the goal is to show Wazuh detection and alerting of
|
||||||
|
unexpected service activity).
|
||||||
|
\end{itemize}
|
||||||
|
\item
|
||||||
|
\textbf{Tools:} Nmap, Hydra (for brute-force), Metasploit (optional
|
||||||
|
for more complex exploits).
|
||||||
|
\item
|
||||||
|
\textbf{Task Breakdown (Days 3-5):}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Day 3:} Set up basic penetration testing environment (tools
|
||||||
|
installation, initial configuration). Execute SSH brute-force attack
|
||||||
|
against an agent.
|
||||||
|
\item
|
||||||
|
\textbf{Day 4:} Execute port scanning against agents. Begin initial
|
||||||
|
configuration of Wazuh rules (if time allows, focus on SSH
|
||||||
|
brute-force and port scanning detection).
|
||||||
|
\item
|
||||||
|
\textbf{Day 5:} Execute the vulnerable service exploit (if chosen).
|
||||||
|
Focus on observing Wazuh's reactions.
|
||||||
|
\end{itemize}
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
\textbf{3. Analysis of Wazuh Reaction (Days 5-7 -- High Priority)}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Focus:} Real-time monitoring, alerting effectiveness, log
|
||||||
|
analysis, and reporting.
|
||||||
|
\item
|
||||||
|
\textbf{Metrics:} Time to detection, accuracy of alerts, frequency of
|
||||||
|
false positives.
|
||||||
|
\item
|
||||||
|
\textbf{Tools:} Wazuh dashboard, log files, command-line tools (grep,
|
||||||
|
less).
|
||||||
|
\item
|
||||||
|
\textbf{Task Breakdown (Days 5-7):}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Days 5-6:} Review Wazuh dashboards and logs in real-time
|
||||||
|
during and after the penetration tests. Analyze the alerts
|
||||||
|
generated.
|
||||||
|
\item
|
||||||
|
\textbf{Day 7:} Generate a basic Wazuh report (daily/weekly summary
|
||||||
|
of detected events).
|
||||||
|
\end{itemize}
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
\textbf{4. Optimization of Wazuh and Security Policies (Days 8-9 --
|
||||||
|
Medium Priority)}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Goal:} Reduce false positives, improve detection accuracy, and
|
||||||
|
tailor Wazuh to the specific environment.
|
||||||
|
\item
|
||||||
|
\textbf{Tasks:} Fine-tune Wazuh rules, adjust thresholds, exclude
|
||||||
|
specific events from monitoring (carefully).
|
||||||
|
\item
|
||||||
|
\textbf{Considerations:} This is iterative. Expect to make adjustments
|
||||||
|
based on observations from the analysis phase.
|
||||||
|
\item
|
||||||
|
\textbf{Task Breakdown (Days 8-9):} Review Wazuh's documentation on
|
||||||
|
rule customization and exclusion. Adjust rules as needed.
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
\textbf{5. Practical Importance \& Use in the Industry (Day 10 -- Low
|
||||||
|
Priority/Presentation Prep)}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Research:} Briefly research how Wazuh is used in different
|
||||||
|
industries (security vendors, cloud providers, etc.).
|
||||||
|
\item
|
||||||
|
\textbf{Presentation:} Prepare a short presentation summarizing the
|
||||||
|
project's findings, demonstrating Wazuh's capabilities, and discussing
|
||||||
|
its potential benefits.
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
\textbf{Potential Difficulties \& Mitigation:}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Time Constraints:} Prioritize core functionality. Don't try to
|
||||||
|
cover everything.
|
||||||
|
\item
|
||||||
|
\textbf{Wazuh Complexity:} The initial setup can be challenging. Start
|
||||||
|
with the basics and gradually add complexity.
|
||||||
|
\item
|
||||||
|
\textbf{False Positives:} Expected. Requires time and effort to
|
||||||
|
mitigate. Emphasize the iterative nature of rule tuning.
|
||||||
|
\item
|
||||||
|
\textbf{Proxmox Knowledge:} Ensure the trainee has basic familiarity
|
||||||
|
with Proxmox.
|
||||||
|
\item
|
||||||
|
\textbf{Dependency Conflicts:} Occasionally, packages can conflict. Be
|
||||||
|
prepared to troubleshoot.
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
\textbf{Important Notes for the Trainee:}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Documentation:} Document every step, including successes and
|
||||||
|
failures. This is critical for learning.
|
||||||
|
\item
|
||||||
|
\textbf{Ask Questions:} Don't hesitate to ask for help.
|
||||||
|
\item
|
||||||
|
\textbf{Focus on Understanding:} The goal is to understand how Wazuh
|
||||||
|
works, not just to get it working.
|
||||||
|
\item
|
||||||
|
\textbf{Have Fun!}
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
To help me refine this plan further, could you tell me:
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
What's the trainee's current level of Linux experience?
|
||||||
|
\item
|
||||||
|
Has the trainee worked with Proxmox before?
|
||||||
|
\item
|
||||||
|
Are there any specific security concepts or vulnerabilities the
|
||||||
|
project should focus on?
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
\subsubsection{USER}\label{user-1}
|
||||||
|
|
||||||
|
Write a summary - potentially visual/graphical - which shows the
|
||||||
|
structure of the chosen setup: proxmox host with several VMs for the
|
||||||
|
different purposes with taking into account network settings, user
|
||||||
|
settings and other necessary information.
|
||||||
|
|
||||||
|
Too answer your questions:\\
|
||||||
|
- The trainee's Linux experience is medium. But he has beginner
|
||||||
|
knowledge in using the command line as he's doing a course by
|
||||||
|
\url{https://tryhackme.com/login}\\
|
||||||
|
- The trainee has not worked with promxox before, but I would help him
|
||||||
|
to setup it up.\\
|
||||||
|
- The project should focus on security concept important in industry
|
||||||
|
environments which are usually internal networks.
|
||||||
|
|
||||||
|
\subsubsection{ASSISTANT}\label{assistant-1}
|
||||||
|
|
||||||
|
Okay, let's create a visual summary of the proposed setup, tailored to
|
||||||
|
the trainee's experience and the focus on internal network security.
|
||||||
|
I'll present this as a layered description that you can translate into a
|
||||||
|
diagram (using tools like draw.io, Lucidchart, or even just hand-drawn).
|
||||||
|
I'll then follow this with considerations for user accounts and
|
||||||
|
networking.
|
||||||
|
|
||||||
|
\textbf{1. Visual Summary - Layered Diagram Description}
|
||||||
|
|
||||||
|
\emph{(Imagine this as a diagram with layers. We'll describe each layer.
|
||||||
|
I'm using text to represent visual elements; you or the trainee would
|
||||||
|
translate this into an actual visual representation).}
|
||||||
|
|
||||||
|
\textbf{Layer 3: Physical Hardware (Base)}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Element:} A box labeled ``Proxmox Host Server''
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Attributes:} ``32GB RAM'', ``Strong CPU'', ``Sufficient
|
||||||
|
Storage''
|
||||||
|
\item
|
||||||
|
\textbf{Connection:} This is the base of the diagram.
|
||||||
|
\end{itemize}
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
\textbf{Layer 2: Virtual Machines (VMs)}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Elements:} Three distinct boxes positioned above the Proxmox
|
||||||
|
Host:
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{VM1: ``Wazuh Manager''}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Attributes:} ``4GB RAM (6-8GB Recommended)'', ``2 vCPUs'',
|
||||||
|
``50GB+ Disk''
|
||||||
|
\item
|
||||||
|
\textbf{Operating System:} Ubuntu Server 22.04 LTS
|
||||||
|
\item
|
||||||
|
\textbf{Services:} \texttt{wazuh-manager}, \texttt{wazuh-logtest},
|
||||||
|
\texttt{wazuh-api}, Elasticsearch (for Wazuh data)
|
||||||
|
\end{itemize}
|
||||||
|
\item
|
||||||
|
\textbf{VM2: ``Agent 1 -- Web Server''}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Attributes:} ``2GB RAM'', ``1 vCPU'', ``30GB Disk''
|
||||||
|
\item
|
||||||
|
\textbf{Operating System:} Ubuntu Server 22.04 LTS (or a
|
||||||
|
simplified web server OS like Alpine Linux for minimal attack
|
||||||
|
surface -- if appropriate for the trainee's skill level)
|
||||||
|
\item
|
||||||
|
\textbf{Services:} Apache/Nginx (minimal web server setup),
|
||||||
|
\texttt{wazuh-agent}
|
||||||
|
\end{itemize}
|
||||||
|
\item
|
||||||
|
\textbf{VM3: ``Agent 2 -- Database Server''} (Optional -- if time
|
||||||
|
allows and the trainee is comfortable)
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Attributes:} ``2GB RAM'', ``1 vCPU'', ``30GB Disk''
|
||||||
|
\item
|
||||||
|
\textbf{Operating System:} Ubuntu Server 22.04 LTS
|
||||||
|
\item
|
||||||
|
\textbf{Services:} MySQL/PostgreSQL (minimal database setup),
|
||||||
|
\texttt{wazuh-agent}
|
||||||
|
\end{itemize}
|
||||||
|
\end{itemize}
|
||||||
|
\item
|
||||||
|
\textbf{Connections:} Arrows pointing \emph{upward} from the Proxmox
|
||||||
|
Host to each VM, indicating virtualization.
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
\textbf{Layer 1: Logical Network (Overlay)}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Element:} A dotted-line box encompassing all three VMs,
|
||||||
|
labeled ``Internal Network (192.168.1.0/24)'' -- This is a simplified
|
||||||
|
private network.
|
||||||
|
\item
|
||||||
|
\textbf{IP Addresses (Example):}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
Proxmox Host (Management Interface): 192.168.1.10
|
||||||
|
\item
|
||||||
|
Wazuh Manager: 192.168.1.11
|
||||||
|
\item
|
||||||
|
Agent 1 (Web Server): 192.168.1.12
|
||||||
|
\item
|
||||||
|
Agent 2 (Database Server): 192.168.1.13
|
||||||
|
\end{itemize}
|
||||||
|
\item
|
||||||
|
\textbf{Firewall:} \emph{Crucially}, a simplified representation of a
|
||||||
|
firewall within the Proxmox Host or on the network itself. This
|
||||||
|
highlights the need for controlled access.
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
\textbf{2. User Accounts \& Security}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Proxmox Host:}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
Create a dedicated user account for the trainee (e.g.,
|
||||||
|
\texttt{wazuh-trainee}). Restrict access to the minimum necessary
|
||||||
|
for managing the VMs.
|
||||||
|
\item
|
||||||
|
Enable 2FA (Two-Factor Authentication) for all Proxmox accounts.
|
||||||
|
\end{itemize}
|
||||||
|
\item
|
||||||
|
\textbf{Wazuh Manager VM:}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
Create a dedicated user for the Wazuh manager (e.g.,
|
||||||
|
\texttt{wazuh}). Restrict privileges.
|
||||||
|
\item
|
||||||
|
\emph{Important:} Configure SSH access to the manager \emph{only}
|
||||||
|
with key-based authentication. Disable password authentication.
|
||||||
|
\end{itemize}
|
||||||
|
\item
|
||||||
|
\textbf{Agent VMs:}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
Create a dedicated user for each agent (e.g., \texttt{webuser},
|
||||||
|
\texttt{dbuser}).
|
||||||
|
\item
|
||||||
|
Restrict user privileges. Use \texttt{sudo} for necessary
|
||||||
|
administrative tasks.
|
||||||
|
\item
|
||||||
|
Disable direct SSH access to the agents if possible (use
|
||||||
|
\texttt{wazuh-agent} for remote management).
|
||||||
|
\end{itemize}
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
\textbf{3. Network Considerations}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Private Network:} Use a private IP address range (e.g.,
|
||||||
|
192.168.1.0/24, 10.0.0.0/24).
|
||||||
|
\item
|
||||||
|
\textbf{DHCP:} Consider a DHCP server for simplified IP assignment.
|
||||||
|
\item
|
||||||
|
\textbf{DNS:} Set up a basic DNS server (even just a local one) for
|
||||||
|
name resolution.
|
||||||
|
\item
|
||||||
|
\textbf{Firewall Rules:} (This is vital for a secure internal network)
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
Allow traffic \emph{between} the VMs necessary for Wazuh monitoring
|
||||||
|
and agent communication.
|
||||||
|
\item
|
||||||
|
Restrict external access to the VMs. For example, only allow SSH
|
||||||
|
access to the Wazuh Manager from the Proxmox Host.
|
||||||
|
\end{itemize}
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
\textbf{Important Notes for the Trainee \& You:}
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
\textbf{Documentation is Key:} Document \emph{everything} -- VM
|
||||||
|
creation, configuration, network settings, user accounts.
|
||||||
|
\item
|
||||||
|
\textbf{Security Best Practices:} Reinforce security best practices
|
||||||
|
throughout the setup process.
|
||||||
|
\item
|
||||||
|
\textbf{Gradual Complexity:} Start with the basics and gradually add
|
||||||
|
complexity as the trainee gains experience.
|
||||||
|
\item
|
||||||
|
\textbf{Focus on the ``Why'':} Explain \emph{why} certain
|
||||||
|
configurations are necessary for security.
|
||||||
|
\item
|
||||||
|
\textbf{Testing:} Thoroughly test the setup after each configuration
|
||||||
|
change.
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
To tailor this further, could you clarify:
|
||||||
|
|
||||||
|
\begin{itemize}
|
||||||
|
\tightlist
|
||||||
|
\item
|
||||||
|
What level of detail should the trainee document? (e.g., full command
|
||||||
|
output, just configuration files)
|
||||||
|
\item
|
||||||
|
Do you want the trainee to focus on specific security concepts (e.g.,
|
||||||
|
least privilege, defense in depth)?
|
||||||
|
\end{itemize}
|
||||||
@@ -6,14 +6,17 @@
|
|||||||
|
|
||||||
### Static IPs
|
### Static IPs
|
||||||
|
|
||||||
| hostname | mac | IP | comment | active |
|
| hostname | mac | IP | comment | active |
|
||||||
| -------- | ----------------- | ------------ | --------------------- | ------ |
|
| ------------ | ----------------- | ------------ | ------------------------ | ------ |
|
||||||
| gw | | 10.11.12.254 | sophos fw | true |
|
| gw | | 10.11.12.254 | sophos fw | true |
|
||||||
| dns1 | | 10.11.12.253 | bind master | true |
|
| dns1 | | 10.11.12.253 | bind master | true |
|
||||||
| dns2 | | 10.11.12.252 | bind slave | true |
|
| dns2 | | 10.11.12.252 | bind slave | true |
|
||||||
| node1 | | 10.11.12.2 | opnsense cluster test | false |
|
| node1 | | 10.11.12.2 | opnsense cluster test | false |
|
||||||
| node2 | | 10.11.12.3 | opnsense cluster test | false |
|
| node2 | | 10.11.12.3 | opnsense cluster test | false |
|
||||||
| vip-wan | | 10.11.12.4 | opnsense cluster test | false |
|
| vip-wan | | 10.11.12.4 | opnsense cluster test | false |
|
||||||
| drawio | | 10.11.12.20 | opnsense cluster test | false |
|
| drawio | | 10.11.12.20 | opnsense cluster test | false |
|
||||||
| pxe | BC:24:11:99:2D:8A | 10.11.12.69 | netbbot_xyz | true |
|
| pve-wazuh | | 10.11.12.40 | patryk test pve | true |
|
||||||
| metabase | | 10.11.12.99 | test for discopharma | false |
|
| wazuh-server | | 10.11.12.41 | patryk test wazuh server | true |
|
||||||
|
| wazuh-win-11 | | 10.11.12.42 | patryk test win11 client | true |
|
||||||
|
| pxe | BC:24:11:99:2D:8A | 10.11.12.69 | netbbot_xyz | true |
|
||||||
|
| metabase | | 10.11.12.99 | test for discopharma | false |
|
||||||
|
|||||||
@@ -1,10 +1,10 @@
|
|||||||
|
|
||||||
## Services
|
## Services
|
||||||
|
|
||||||
- [ ] Kerio Control (Firewall)
|
- [ ] Kerio Control (Firewall) --> not good; could die in the process
|
||||||
- [ ] Kerio Connect (Mail Server)
|
- [x] Kerio Connect (Mail Server)
|
||||||
- [ ] Univention LDAP/DNS
|
- [x] Univention LDAP/DNS (not needed as it seems)
|
||||||
- [ ] Synology
|
- [x] Synology
|
||||||
- [ ] Mailstore
|
- [x] Mailstore
|
||||||
- [ ] Filewave
|
- [x] Filewave
|
||||||
- [ ] Projekt Pro
|
- [x] Projekt Pro (not necessary; caddy in front)
|
||||||
Reference in New Issue
Block a user