Thursday, September 17, 2020

Security Onion 2.2 (Release Candidate 3) Available for Testing!

In 2018, Security Onion Solutions started working on the next major version of Security Onion, code-named Hybrid Hunter:
https://blog.securityonion.net/2018/11/security-onion-hybrid-hunter-101-tech.html

We recently dropped the Hybrid Hunter code name and announced 2.0 (RC1) and 2.1 (RC2).  Today, we are proud to release Security Onion 2.2 (Release Candidate 3)! It has some amazing new features and improvements!

First, we have a new so-analyst script that will optionally install a GNOME desktop environment, Chromium web browser, NetworkMiner, Wireshark, and many other analyst tools.

Next, we've collapsed Hunt filter icons and action links into a new quick action bar that will appear when you click a field value. Actions include:

  • Filtering the hunt query
  • Pivot to PCAP
  • Create an alert in TheHive
  • Google search for the value
  • Analyze the value on VirusTotal.com

Finally, we've greatly improved support for airgap deployments. There is more work to be done in the next release, but we're getting closer!

Release Candidate

This is our third Release Candidate for the new 2.x platform, so we're getting closer to a final release, but we're not quite there yet. Please be reminded of the usual pre-release warnings and disclaimers:

  • If this breaks your system, you get to keep both pieces!
  • This is a work in progress and is in constant flux.
  • This configuration may change drastically over time leading up to the final release.
  • Do NOT run this on a system that you care about!
  • Do NOT run this on a system that has data that you care about!
  • This script should only be run on a TEST box with TEST data!
  • Use of this script may result in nausea, vomiting, or a burning sensation.

Documentation

We've started migrating our documentation to 2.2:
https://docs.securityonion.net/en/2.2/

However, this is a work in progress and some documentation may be missing or incorrect. Please let us know if you notice any issues.

Existing Installations

If you have an existing 2.0 (RC1 or RC2) installation, please see the soup page on our documentation site:
https://docs.securityonion.net/en/2.2/soup.html

New Installations

If you want to do a new installation, please review the 2.2 documentation and then you can find instructions here:
https://docs.securityonion.net/en/2.2/download.html

Questions or Problems

If you have questions or problems, please see:
https://docs.securityonion.net/en/2.2/community-support.html

Known Issues

https://docs.securityonion.net/en/2.2/release-notes.html#known-issues

Changes from Previous Releases

https://docs.securityonion.net/en/2.2/release-notes.html#changes

Thanks

Lots of love went into this release!

Special thanks to all our folks working so hard to make this release happen!

  • Josh Brower
  • Jason Ertel
  • Wes Lambert
  • Josh Patterson
  • Mike Reeves
  • Bryant Treacle
  • William Wernert

Screenshot Tour

The screenshots below show the new Analyst Workstation running on an Import node in a minimal VM with only 4GB RAM!

ISO Boot Menu

ISO Installer

Reboot, login, and configure the system

Set hostname

Select management NIC

Configure management NIC

Configure networking

Configure networking

Configure networking

Configure networking

Configure networking

Configure HOME_NET

Create User Account

Set Password

Confirm Password

Specify access method

Run so-allow

Specify IP address or range to allow through host-based firewall

Confirm options and proceed

Setup complete

so-analyst

so-analyst complete

Select username

Enter password to Sign in to GNOME Desktop

so-analyst includes Chromium, NetworkMiner, Wireshark, and more!

so-import-pcap

Logs from so-import-pcap

New Quick Action Bar

PCAP overview

PCAP transcript

Downloading the pcap, opening with NetworkMiner, and extracting the malicious file

All this in a minimal VM with only 4GB of RAM!


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.