We can easily pull in Alienvault OTX pulses into Security Onion and have Zeek utilize them for the Intel Framework by leveraging Stephen Hosom's work with Alienvault OTX integration.
Warning
Please keep in mind we do not officially support use of this script, so installation is at your own risk.
In order to begin, we will need to make sure we satisfy a few prerequisites:
Download the installation script:
wget https://raw.githubusercontent.com/weslambert/securityonion-otx/master/securityonion-otx
Run the script:
sudo bash securityonion-otx
After using the above script, /opt/bro/share/bro/policy/bro-otx
will house all necessary files, etc (including otx.dat
, the intel file where all pulses will be fed).
We can test our configuration by adding another piece of intel to the end of /opt/bro/share/bro/policy/bro-otx/otx.dat
. For example:
google.com[literal tab]Intel::DOMAIN[literal tab]Test-Google-Intel[literal tab]https://google.com[literal tab]T
As long as our syntax is correct, we should not need to restart Zeek. We can check for errors in /nsm/bro/logs/current/reporter.log
.
Let's see if we can get an intel hit by doing the following:
curl google.com
Next, we need to check /nsm/bro/logs/current/intel.log
for entries in regard to our indicator:
grep google /nsm/bro/logs/current/intel.log
We should have received a Zeek Notice as well, so lets check that:
grep google /nsm/bro/logs/current/notice.log
After successful testing, we can remove our addition from /opt/bro/share/bro/policy/bro-otx/otx.dat
or just run /opt/bro/share/bro/policy/bro-otx/bro-otx.py
again.
- By default, pulses will be retrieved on an hourly basis. To change this to a different value, simply alter the interval in
/etc/cron.d/bro-otx
.