[00:00] (0.12s)
I have always wanted to do this for a
[00:01] (1.96s)
video but it's been a little bit
[00:03] (3.28s)
daunting because configuring elk elastic
[00:06] (6.00s)
log stash Cabana this whole structure
[00:08] (8.32s)
and setup for a seam solution or Sim
[00:10] (10.80s)
however you pronounce it can be a little
[00:12] (12.40s)
bit a lot of moving pieces right so I'm
[00:15] (15.28s)
excited I'm stoked I'm super happy to be
[00:17] (17.16s)
able to do this with the help of John
[00:19] (19.36s)
strand's courses his introductory Labs
[00:21] (21.68s)
that are freely available all online
[00:23] (23.64s)
just as a gentle reminder you can always
[00:25] (25.52s)
be jumping into any of John strands and
[00:27] (27.48s)
anti- siphon training and black hills
[00:29] (29.00s)
information security in this awesome
[00:30] (30.72s)
tribe of companies pay what you can
[00:32] (32.60s)
training if you haven't seen it it's
[00:34] (34.36s)
just literally courses education free
[00:36] (36.72s)
training that you can choose the price
[00:38] (38.72s)
tag for but if you take a look they do
[00:40] (40.24s)
have some incredible courses coming up
[00:42] (42.36s)
like their active defense and cyber
[00:43] (43.76s)
deception course and tons and tons more
[00:46] (46.08s)
there's things that you could learn all
[00:47] (47.32s)
about making hackers earn their access
[00:49] (49.40s)
and making them cry when you're wasting
[00:50] (50.88s)
their time doing some great defense in
[00:52] (52.84s)
depth and tons of great stuff from John
[00:55] (55.00s)
strand well he's always putting out a
[00:56] (56.64s)
lot of these pay what you can training
[00:58] (58.12s)
if you haven't registered for these
[00:59] (59.32s)
before you just cruise through it hey
[01:00] (60.68s)
fill out whatever forms you need to but
[01:02] (62.28s)
you get down to the price section look
[01:04] (64.08s)
you can pay the minimum you can pay 50
[01:05] (65.48s)
you can pay 95 but if you want to bring
[01:07] (67.48s)
this down even lower to make it more
[01:09] (69.40s)
accessible for you if you just don't
[01:10] (70.64s)
have the cash it is pay what you can so
[01:13] (73.20s)
for tuition assistance you can click
[01:15] (75.04s)
here and then you'll get a new form
[01:16] (76.92s)
where all of those pricing options go
[01:19] (79.08s)
away and you just register and you sign
[01:20] (80.88s)
up and that's it you can make this
[01:22] (82.28s)
course free accessible to you there are
[01:24] (84.44s)
tons of other pay what you can courses
[01:26] (86.40s)
and it's always worth just taking a look
[01:27] (87.80s)
at what is antiphon training up to what
[01:29] (89.60s)
is black kills information security up
[01:31] (91.28s)
to and hey how can I jump into Wild West
[01:33] (93.84s)
hacking Fest their conference anyway
[01:35] (95.92s)
let's get into their publicly accessible
[01:37] (97.88s)
and free introductory Labs that are part
[01:40] (100.00s)
of these pay what you can courses you
[01:41] (101.60s)
can find them online just on GitHub
[01:43] (103.08s)
strand JS intro labs and in the past
[01:45] (105.60s)
couple of videos we set up a virtual
[01:47] (107.00s)
machine where we've gotten a chance to
[01:48] (108.32s)
play with a lot of these Labs but there
[01:49] (109.80s)
are so many that you can just cruise
[01:51] (111.44s)
through so in this video I want to get
[01:53] (113.08s)
into elk elastic log stash Cabana and
[01:56] (116.92s)
this is a three-part series for their
[01:58] (118.96s)
walkthrough for their write ups of the
[02:00] (120.64s)
labs but I want to cram this all into
[02:02] (122.60s)
one video so look they get into the good
[02:04] (124.56s)
stuff we're setting up a seam and you
[02:06] (126.56s)
could also toggle on rules to alert us
[02:08] (128.84s)
when Defenders are attacking our
[02:10] (130.24s)
organization what tradecraft what ttps
[02:12] (132.88s)
from the miter attack framework and all
[02:14] (134.36s)
are they all up to but this is awesome
[02:16] (136.92s)
you can get started with elk using the
[02:18] (138.68s)
elastic Cloud just 14-day trial doesn't
[02:21] (141.28s)
require a credit card you just need an
[02:22] (142.80s)
email and a password and all we do is
[02:24] (144.68s)
just set up a free account so I'm going
[02:26] (146.20s)
to do it jumping over to this URL this
[02:28] (148.00s)
is all it takes just start your free IC
[02:30] (150.16s)
Cloud trial let me fill out my email
[02:33] (153.00s)
address choose a password and then sign
[02:35] (155.24s)
up with email nice and easy now we can
[02:37] (157.04s)
just cruise through a super simple form
[02:39] (159.16s)
hey I'll just put my name company is
[02:41] (161.36s)
self uh I am new to elastic and I'm more
[02:44] (164.56s)
interested in security I'd like to just
[02:46] (166.84s)
learn more about elastic let's do it all
[02:48] (168.76s)
right now we need to create a new
[02:50] (170.12s)
deployment I can just call mine I don't
[02:51] (171.80s)
know security deployment how about that
[02:55] (175.04s)
uh we could change some of the settings
[02:56] (176.60s)
but I think I'm just fine with the
[02:57] (177.72s)
defaults let's go and create our
[02:59] (179.12s)
deployment and cool oh w we have 150
[03:01] (181.68s)
days left of our trial goodness it's
[03:03] (183.04s)
more than 14 okay now it's doing its
[03:04] (184.84s)
thing it is creating our deployment
[03:06] (186.40s)
doing whatever configuration things that
[03:07] (187.88s)
it needs we could cruise through with
[03:09] (189.64s)
the tour um but I don't really need to
[03:11] (191.80s)
do that I just kind of want to go back
[03:13] (193.04s)
to my deployment um oh shoot and it
[03:15] (195.44s)
showed me credentials can I get back to
[03:17] (197.12s)
that these root credentials are shown
[03:18] (198.72s)
only once oh goodness okay uh I guess
[03:21] (201.08s)
I'll just check the frame of the video
[03:23] (203.04s)
maybe and it is still creating the
[03:25] (205.00s)
deployment the video is cruising through
[03:26] (206.36s)
but I have now seen after a little bit
[03:28] (208.12s)
of time the Cabana menu open up in the
[03:30] (210.00s)
navigation so kind of taking a look at
[03:32] (212.12s)
what the lab suggests we should be able
[03:33] (213.88s)
to go ahead and open up Cabana and once
[03:36] (216.56s)
this thing finishes up we can go ahead
[03:38] (218.12s)
and move on with the lab here okay now
[03:40] (220.08s)
this has popped up looks like I have my
[03:41] (221.64s)
cabana instance up and running um I can
[03:44] (224.44s)
edit the configuration I can play with
[03:47] (227.60s)
monitoring the health here copy endpoint
[03:49] (229.96s)
can I just open this oh okay cool yeah
[03:52] (232.08s)
now we're going somewhere new all right
[03:53] (233.76s)
now we've loaded up Cabana seemingly or
[03:57] (237.00s)
we're still in elastic but let me go
[03:58] (238.56s)
ahead and manage deployment and I could
[04:01] (241.96s)
move down to okay Security Management o
[04:05] (245.52s)
fleet Fleet is what I'm looking for that
[04:07] (247.24s)
is what I suggested next in the lab and
[04:09] (249.72s)
we want to be able to add an agent here
[04:12] (252.68s)
so I'm going to go ahead and click on
[04:13] (253.72s)
this add agent button and then adding
[04:16] (256.12s)
elastic agents to your hosts allows it
[04:18] (258.16s)
to collect data and send it to the
[04:19] (259.48s)
elastic stack okay what type of host are
[04:21] (261.72s)
you adding they're controlled by an
[04:23] (263.36s)
agent policy creating new policy to get
[04:26] (266.12s)
started um I realize my face is in the
[04:28] (268.80s)
way uh the Advanced options no I think
[04:31] (271.80s)
that's all just fine I'm going to assume
[04:34] (274.00s)
again totally defaults are good I'll H
[04:35] (275.92s)
create policy and then we'll be able to
[04:38] (278.16s)
allow the other options to enroll in
[04:39] (279.96s)
Fleet and install the elastic agent will
[04:41] (281.92s)
all be done for me cool yep okay
[04:43] (283.92s)
seemingly good we will enroll in Fleet
[04:45] (285.96s)
install the elastic agent on your host
[04:47] (287.76s)
oh okay we will toggle this to Windows
[04:50] (290.32s)
and that should be all good for me I'll
[04:52] (292.40s)
just want to copy this syntax and then
[04:54] (294.28s)
the lab suggests hey we just save this
[04:56] (296.32s)
we just take note of it so we know how
[04:58] (298.00s)
we can go ahead and install this when
[04:59] (299.52s)
the time comes but then we'll move into
[05:01] (301.40s)
part two of this little lab walkthr and
[05:03] (303.56s)
that way we'll be able to actually
[05:04] (304.60s)
install and configure the elastic agent
[05:06] (306.32s)
so let me just open up notepad I suppose
[05:09] (309.00s)
that's fine and I'll paste this in so it
[05:12] (312.24s)
looks like this syntax like the
[05:14] (314.00s)
Powershell code that they give here is
[05:15] (315.52s)
just everything that you need to
[05:16] (316.80s)
actually download the elastic agent
[05:18] (318.96s)
expand the archive like decompress the
[05:20] (320.80s)
zip file and then install the elastic
[05:23] (323.04s)
agent uh I think we could basically skip
[05:25] (325.44s)
over what would be lab number two here
[05:28] (328.00s)
on installing the whole agents so let me
[05:30] (330.16s)
go ahead and copy the syntax and I'll
[05:31] (331.96s)
open up a Windows terminal I'll h
[05:34] (334.36s)
control shift enter on my keyboard so
[05:36] (336.24s)
that I can open this up in the admin
[05:37] (337.96s)
mode I'm going to go and full screen
[05:39] (339.76s)
this and I suppose I will make a
[05:41] (341.64s)
directory for like elastic so at least
[05:44] (344.24s)
this is kind of clean and not just
[05:45] (345.68s)
randomly in my user profile now I'll go
[05:48] (348.00s)
ahead and paste all this in because
[05:49] (349.64s)
there's currently nothing in the path
[05:51] (351.16s)
here and I'll let it download the
[05:53] (353.28s)
elastic agent for me now that that's
[05:54] (354.84s)
done it's going to try and decompress
[05:56] (356.24s)
the zip archive expand archive and
[05:58] (358.20s)
Powershell okay and now it's going to go
[05:59] (359.92s)
ahead and install the agent it says the
[06:01] (361.40s)
elastic agent will be installed in C
[06:03] (363.16s)
program files elastic agent and will run
[06:05] (365.16s)
as a service do you want to continue
[06:06] (366.64s)
let's hit y for yes enter that and let
[06:09] (369.48s)
it do its thing okay it took a little
[06:11] (371.04s)
bit but uh looks like it says
[06:12] (372.48s)
successfully triggered restart on
[06:13] (373.92s)
running elastic agents successfully
[06:15] (375.96s)
enrolled the elastic agent the elastic
[06:17] (377.80s)
agent has been successfully installed
[06:20] (380.36s)
awesome let me clear the screen here
[06:22] (382.04s)
toggling back over to elastic over in
[06:24] (384.20s)
the web browser you can see hey One
[06:25] (385.56s)
agent has been enrolled incoming data is
[06:27] (387.56s)
confirmed and we are ingesting
[06:29] (389.68s)
everything that we need we can click on
[06:30] (390.96s)
that view enrolled agent and here it is
[06:33] (393.08s)
there's my desktop host name now I can
[06:35] (395.04s)
click on this and go take a look at what
[06:37] (397.72s)
is all coming from this here's the last
[06:39] (399.52s)
activity last check-in message agent
[06:41] (401.88s)
policy that we Define the agent version
[06:43] (403.96s)
platform okay so now in the intro laabs
[06:46] (406.36s)
walkthrough we basically just jumped
[06:48] (408.20s)
over what would be part two and now we
[06:50] (410.36s)
can move on to part three where we're
[06:52] (412.12s)
chatting about what data we might ingest
[06:54] (414.20s)
into elastic and they say look by
[06:56] (416.16s)
default Windows logs are not ideal
[06:59] (419.00s)
because it's just kind of aorus Borg of
[07:01] (421.60s)
whatever actually comes through for it
[07:02] (422.92s)
and some things might not actually be
[07:04] (424.24s)
audited by default so to get logs that
[07:06] (426.52s)
are more readable and useful we can use
[07:08] (428.56s)
and we should be using cismon by the way
[07:11] (431.00s)
you'll practically like never ever find
[07:12] (432.76s)
a client organization and environment
[07:14] (434.56s)
that is actually using in as deployed
[07:16] (436.08s)
cismon but when you do if you do it's
[07:18] (438.76s)
awesome we can follow this link to
[07:20] (440.92s)
download sysmon it is part of the tool
[07:23] (443.72s)
sets that are created by Mark rosovich
[07:25] (445.56s)
let me open this up in a new tab here I
[07:27] (447.32s)
can scroll down and click the download
[07:28] (448.88s)
cismon and now I do have that zip
[07:30] (450.56s)
archive once more let's move back to our
[07:33] (453.80s)
uh administrative Powershell window and
[07:35] (455.72s)
move into the downloads directory oh
[07:38] (458.00s)
forgive me that should be downloads and
[07:40] (460.08s)
I know look yeah I could probably do
[07:41] (461.56s)
this all in one command but I just like
[07:43] (463.12s)
typing CD over and over again uh so
[07:45] (465.28s)
let's get our cismon doz file that I see
[07:47] (467.80s)
there let's go ahead and expand archive
[07:50] (470.68s)
just as we saw in the elastic agent
[07:52] (472.72s)
syntax to go ahead and extract this ZIP
[07:55] (475.16s)
archive and now we should have a sysmon
[07:57] (477.40s)
directory as we do so let's move in into
[07:59] (479.92s)
that directory and I have the cismon 64
[08:03] (483.48s)
that we probably want to run on our
[08:04] (484.76s)
64-bit architecture we can go ahead and
[08:07] (487.08s)
run our cismon 64.exe failed to start
[08:10] (490.52s)
the service the operation completed
[08:12] (492.00s)
successfully what does that
[08:13] (493.56s)
mean uh what does the lab suggest okay
[08:16] (496.16s)
they uh end up using cismon on its own
[08:18] (498.96s)
Tac I Tac n and accept Ula is Tac I to
[08:22] (502.28s)
install is there like a tack H for help
[08:24] (504.72s)
yeah okay cool okay the usage we can
[08:26] (506.80s)
install with cismon Tac I what is n was
[08:30] (510.24s)
that even a thing uh it doesn't seem to
[08:32] (512.08s)
be anymore anyway so let me use that
[08:35] (515.36s)
cismon 64 Tac I cismon is already
[08:39] (519.56s)
registered uninstall cismon before
[08:41] (521.40s)
reinstalling okay so we're good like
[08:43] (523.08s)
it's just doing its thing right now can
[08:45] (525.60s)
service oh yeah yeah yeah okay there is
[08:47] (527.96s)
64bit uh cismon running as a service so
[08:51] (531.40s)
I'm assuming all is good and now that
[08:53] (533.12s)
cismon is running on our system we need
[08:54] (534.56s)
to configure our elastic agent to
[08:56] (536.08s)
configure and gather these logs sign
[08:58] (538.20s)
into your account navigate back to
[08:59] (539.92s)
Cabana move into Fleet and then check
[09:01] (541.96s)
out the Integrations as to what agents
[09:04] (544.36s)
might be pulling stuff in then we can
[09:05] (545.84s)
add the integration for Windows and then
[09:08] (548.04s)
toggle on the button for sysmon uh let's
[09:10] (550.72s)
go try it out so back in Cabana as part
[09:13] (553.16s)
of our elk stack we'll move over to
[09:15] (555.56s)
Fleet and I don't see any Integrations
[09:19] (559.16s)
oh oh oh oh if we go into agent policies
[09:22] (562.04s)
you can click in on the policy that
[09:24] (564.04s)
you've defined and now the Integrations
[09:26] (566.16s)
is there let me see if I can add
[09:28] (568.00s)
integration and I'm going to assume I
[09:30] (570.32s)
would be able to browse for Windows
[09:33] (573.16s)
there's a whole lot of entries here uh
[09:34] (574.52s)
let me just go and search for it let me
[09:35] (575.80s)
search for Windows here we go click on
[09:38] (578.44s)
Windows I just want to scroll down into
[09:40] (580.24s)
this overview does it actually give me a
[09:41] (581.72s)
little bit more like sysmon specifically
[09:44] (584.24s)
I don't know let's try it let me just
[09:45] (585.84s)
add Windows there we go and uh
[09:48] (588.24s)
integration name is Windows one
[09:49] (589.96s)
forwarded Powershell Powershell
[09:51] (591.48s)
operational oh syst one operational okay
[09:53] (593.08s)
perfect I think all of this looks good
[09:55] (595.64s)
we can add it to existing hosts with the
[09:57] (597.48s)
agent policy one and let me click the
[09:59] (599.44s)
bottom right button that my face is in
[10:00] (600.84s)
the way save and continue save and
[10:02] (602.92s)
deploy changes I'm good with that okay
[10:05] (605.24s)
Windows one integration added now our
[10:07] (607.68s)
agent policy one has system integration
[10:09] (609.88s)
and windows perfect uh let me go take a
[10:12] (612.88s)
look back at our Fleet let's check our
[10:14] (614.92s)
agents and we should see that it is
[10:16] (616.88s)
working with the windows integration and
[10:18] (618.40s)
can pull from uh sysmon just as well now
[10:22] (622.00s)
it says Hey play around on the computer
[10:23] (623.52s)
that has the elastic agent installed
[10:25] (625.08s)
move files around create file Start
[10:26] (626.92s)
program make a few Google searches this
[10:28] (628.56s)
will generate some LS to ensure we have
[10:30] (630.40s)
syst on logs reaching our Cloud after
[10:32] (632.52s)
you've created some log activities you
[10:33] (633.84s)
can navigate to Cabana discover well
[10:36] (636.40s)
okay uh let me get back to I suppose our
[10:40] (640.68s)
little command line here let's just fire
[10:42] (642.52s)
up the calculator of course that normal
[10:45] (645.08s)
operations can I run like who am I I
[10:47] (647.20s)
don't know if that'll do anything um I
[10:49] (649.28s)
don't know should I just open up word
[10:51] (651.12s)
pad how about that is that going to run
[10:53] (653.68s)
is it in the path how do you access word
[10:55] (655.48s)
pad Powershell probably just didn't know
[10:57] (657.44s)
where the heck it was whatever uh so so
[10:59] (659.68s)
hopefully we have some Sison log events
[11:01] (661.96s)
now I think uh Sison process start is
[11:04] (664.44s)
just one when you've created a process
[11:07] (667.04s)
uh the event ID for cismon is one so if
[11:09] (669.64s)
we navigate back to Cabana move into the
[11:12] (672.44s)
Discover dashboard set the source to
[11:14] (674.64s)
logs then we can look at the time
[11:16] (676.80s)
constraint for today uh let me go back
[11:19] (679.48s)
to the little hamburger menu and let's
[11:21] (681.44s)
go to discover let's set our uh data
[11:24] (684.68s)
view source to logs we'll set this to
[11:28] (688.28s)
today as it is is good and now I need to
[11:30] (690.60s)
go figure out and find what Fields would
[11:33] (693.04s)
be worthwhile to search for uh our agent
[11:36] (696.24s)
name is probably worth while because I
[11:38] (698.12s)
want to get the things from our desktop
[11:41] (701.44s)
good and if I put this in the documents
[11:43] (703.32s)
view then it'll actually show it with
[11:44] (704.56s)
the timestamp uh can I get any specific
[11:48] (708.28s)
like process names that are started we
[11:51] (711.16s)
have a vent action that might be worth
[11:53] (713.12s)
adding okay not a whole lot of entries
[11:55] (715.60s)
there DNS queries interesting O process
[11:58] (718.28s)
create process create
[12:00] (720.00s)
that is good that's got to be an event
[12:02] (722.56s)
ID that comes with that right okay event
[12:04] (724.32s)
ID let me add this a lot of those are
[12:07] (727.12s)
empty even on process create so that's
[12:09] (729.88s)
dumb are there any processes that we can
[12:12] (732.76s)
run oh even Powershell stuff though that
[12:14] (734.68s)
could be
[12:15] (735.48s)
worthwhile process O Okay process
[12:18] (738.16s)
command line let me add this okay now
[12:20] (740.24s)
can I see us trying to run oh yeah I can
[12:23] (743.28s)
here's my word pad excellent here's who
[12:25] (745.80s)
am I as I just type those in the command
[12:27] (747.96s)
line and Cal check it out here's us
[12:30] (750.40s)
trying to run
[12:31] (751.92s)
cismon oh the lab actually says you can
[12:34] (754.20s)
set a filter on your data to limit the
[12:36] (756.04s)
results just to Sison data that can be
[12:37] (757.92s)
done by setting the data stream. datet
[12:40] (760.32s)
field for windows. cismon operational uh
[12:43] (763.52s)
okay we can try that okay so add filter
[12:47] (767.28s)
um we wanted data stream. dat set is and
[12:52] (772.92s)
then windows. syston operational right
[12:56] (776.12s)
let's add filter Okay cool so it was
[12:58] (778.08s)
looking at the same sort of stuff we
[12:59] (779.48s)
were looking at just a moment ago and
[13:01] (781.12s)
check it out there is our process create
[13:03] (783.92s)
word pad who am I in Cal nice so if we
[13:07] (787.52s)
wanted to filter that even more I think
[13:09] (789.52s)
we could do like uh what is it it's win
[13:12] (792.44s)
log event ID can be uh colon one right
[13:18] (798.88s)
so it's setting to a value of one and
[13:21] (801.32s)
that should be the I don't I don't want
[13:24] (804.60s)
an and I just want that please can I do
[13:27] (807.24s)
that go filter yeah okay so now we're
[13:30] (810.20s)
only getting the process create and you
[13:32] (812.04s)
can see cismon you can see uh elastic
[13:35] (815.08s)
stack and the agent coming together that
[13:37] (817.44s)
is super duper cool and that can help us
[13:39] (819.20s)
do some further analysis with an elk and
[13:42] (822.68s)
that is that that is three of the kind
[13:45] (825.04s)
of written GitHub free Labs part of the
[13:47] (827.52s)
introductory courses of John strand
[13:49] (829.16s)
anti- siphon training Black Hills
[13:50] (830.40s)
information security all of their pay
[13:52] (832.08s)
what you can courses and really really
[13:54] (834.04s)
cool that we finally just got an
[13:55] (835.32s)
opportunity to spin up elk because now
[13:57] (837.80s)
we can do a little bit more of that you
[13:59] (839.56s)
know sweet stuff detection engineering I
[14:01] (841.64s)
don't know tracking around in an EDR and
[14:03] (843.24s)
a seam to see what logs are happened
[14:04] (844.76s)
where when and how all the stuff that
[14:06] (846.52s)
can help you for your job and like the
[14:09] (849.28s)
real world in the industry I hope that's
[14:11] (851.08s)
pretty cool I hope that is actually
[14:12] (852.88s)
tactical uh information security
[14:14] (854.92s)
education so hey check out Black Hill
[14:17] (857.20s)
information security antiphon training
[14:18] (858.56s)
pay what you can courses all the
[14:19] (859.60s)
incredible stuff that John Str is up to
[14:21] (861.32s)
and thank you so much for watching this
[14:22] (862.68s)
video hope it was fun hope you learned
[14:24] (864.08s)
something new hope we had a great time
[14:25] (865.24s)
together and I'll see you in the next
[14:26] (866.64s)
video like comment subscribe become a
[14:28] (868.08s)
member become a member of the channel
[14:29] (869.64s)
that really really helps support all the
[14:31] (871.12s)
stuff that we're doing here thanks again