stasis.dev
Open in
urlscan Pro
162.159.152.4
Public Scan
Submitted URL: https://stasis.dev/integrating-wazuh-with-dfir-iris-559bc9b057f1
Effective URL: https://stasis.dev/integrating-wazuh-with-dfir-iris-559bc9b057f1?gi=311d8e1d996a
Submission Tags: demotag
Submission: On June 10 via api from RW — Scanned from DE
Effective URL: https://stasis.dev/integrating-wazuh-with-dfir-iris-559bc9b057f1?gi=311d8e1d996a
Submission Tags: demotag
Submission: On June 10 via api from RW — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Open in app Sign up Sign in Write Sign up Sign in INTEGRATING WAZUH WITH DFIR IRIS STASIS · Follow 4 min read · Oct 15, 2023 94 4 Listen Share [Update March 2024] At the time of writing this article DFIR IRIS v2.3.7 was the latest version. As of DFIR-IRIS v2.4.5 this integration has broken. I will however try to spend some time updating the script to coincide with any new changes to the API that were made. This article will guide you on integrating Wazuh and DFIR Iris. Special Shout Outs Before we start it wouldn't be fair not to recognize some great people that are contributing to the Open Source cybersecurity community. Nate Uribe — https://github.com/nateuribe Nate created the original integration that I modified and built upon. He deserves the real credit for making this happen. SOCFortress — These awesome people are driving security forward in the open source world. They provide many guides around Security Engineering including how to deploy and integrate various solutions. They also have some great DFIR Iris modules they have created. Check them out here. WHAT Wazuh: Enterprise ready open-source Security Information Event Management and XDR solution that is rapidly gaining traction with organizations across the world. DFIR IRIS: Open source Incident Response/Case Management platform built for collaboration. Support for third party modules to assist in investigations including Virustotal and MISP. Ability to build and add your own modules. Easy to use and customize. DEPLOYMENT Prerequisites Wazuh: https://stasis.dev/siem-deploying-wazuh-5e7f1126eaf DFIR Iris: https://docs.dfir-iris.org/getting_started/ Integration Files: https://github.com/chadhardcastle/Wazuh-IRIS-integration Installation 1. Deploy the integration script to your Wazuh server. This is the script that Wazuh calls upon to send events/alerts to DFIR Iris. In my modified version the Wazuh alert titles map to the Iris alert title field. Another change I made was creating a function to pull the “message” field from the JSON and send it to the Iris Alert description field. I have also included the Agent information as seen in the examples at the bottom of this article. git clone https://github.com/chadhardcastle/Wazuh-IRIS-integration.git cd Wazuh-IRIS-integration/ cp custom-iris.py /var/ossec/integrations/custom-iris.py chmod 750 /var/ossec/integrations/custom-iris.py chown root:wazuh /var/ossec/integrations/custom-iris.py 2. Grab your DFIR IRIS API key You can find your DFIR IRIS API key in the webconsole by selecting your profile->My settings 3. Add the integration block to your Wazuh config file found at /var/ossec/etc/ossec.conf <!-- ... Rest of config --> <!-- IRIS integration --> <integration> <name>custom-iris.py</name> <hook_url>http://IRIS-BASE-URL:8000/alerts/add</hook_url> <level>7</level> <api_key>APIKEY</api_key> <alert_format>json</alert_format> </integration> </ossec_config> If you put your integrations at the end of your ossec.conf file like I do, it should look something like this: 4. Once you have completed the above, restart the wazuh-manager service systemctl restart wazuh-manager You should now start seeing alerts flowing into DFIR IRIS Example Alerts Windows Defender Mimikatz detection as seen in DFIR IRIS Docker Error Message alert as seen in DFIR IRIS Troubleshooting Depending on how you deployed your infrastructure you may run into issues connecting Wazuh to Iris. If you are not seeing alerts in Iris you may be experiencing any of the following issues: * Alert level in ossec.config integration settings set high and no new events of that level have been triggered. Its likely you have not received a new event meeting the requirements you set, or there is a connection issue with your integration. Check the ossec.log log file for any signs of integration errors. * “Connection Refused” errors found in your integration.log and/or ossec.log files. This can signify either a firewall issue on the servers hosting Wazuh and/or Iris, or a configuration issue with the docker-compose.yaml file for Iris. I had the latter issue. My Iris WebApp container had the port section set to -” 0.0.0.0:8000:8000". While I could still access the server via the web from my internal infrastructure, I was unable to send API calls. I fixed this by modifying the IP to the local IP of the server I was running the containers on. Conclusion I hope you enjoyed this guide as much as I did writing it. One thing that wasn’t detailed in the guide was to ensure you have backups setup. There are plenty of great open source security tools and many more people championing them. SIGN UP TO DISCOVER HUMAN STORIES THAT DEEPEN YOUR UNDERSTANDING OF THE WORLD. FREE Distraction-free reading. No ads. Organize your knowledge with lists and highlights. Tell your story. Find your audience. Sign up for free MEMBERSHIP Access the best member-only stories. Support independent authors. Listen to audio narrations. Read offline. Join the Partner Program and earn for your writing. Try for 5 $/month Siem Cybersecurity Security Engineering Technology Wazuh 94 94 4 Follow WRITTEN BY STASIS 44 Followers Follow MORE FROM STASIS STASIS SOAR: DEPLOYING SHUFFLE IN THIS GUIDE WE WILL BE DEPLOYING SHUFFLE TO A VIRTUAL MACHINE RUNNING UBUNTU 23.04. 4 min read·Sep 2, 2023 6 STASIS SIEM: DEPLOYING WAZUH IN THIS ARTICLE WE WILL DEPLOY THE WAZUH (V4.5) SIEM TO A SINGLE NODE IN OUR LAB ENVIRONMENT. 6 min read·Sep 12, 2023 12 1 See all from STASIS RECOMMENDED FROM MEDIUM Aditya Yadav WAZUH ENDPOINT DETECTION AND RESPONSE (EDR) ARE A SERIES OF TOOLS AND APPLICATIONS THAT MONITOR DEVICES FOR AN ACTIVITY THAT COULD INDICATE A… 6 min read·Mar 9, 2024 8 Hasitha Upekshitha SIMPLIFYING SECURITY OPERATIONS: INSTALLING WAZUH, THE HIVE, CORTEX, AND MISP USING DOCKER IN THE EVER-EVOLVING LANDSCAPE OF CYBERSECURITY, DEPLOYING AN INTEGRATED SET OF TOOLS IS CRUCIAL FOR EFFECTIVE THREAT DETECTION, ANALYSIS… 3 min read·Feb 26, 2024 19 2 LISTS AI REGULATION 6 stories·476 saves CHATGPT PROMPTS 48 stories·1652 saves TECH & TOOLS 16 stories·245 saves GENERATIVE AI RECOMMENDED READING 52 stories·1117 saves DavidtheGoliath USING SHUFFLE SOAR TO CREATE CASES IN DFIR IRIS THIS WRITE UP SHOWS YOU HOW TO CREATE A TICKET FROM AN ALERT AND PERFORM REMEDIATING ACTIONS ON YOUR FIREWALL USING SHUFFLE. 7 min read·Jan 24, 2024 29 2 Adonay T. INTRODUCTION THIS BLOG ENTRY DETAILS HOW WE CAN AUTOMATE WAZUH TO TAKE ADVANTAGE OF THE MISP API. THIS AUTOMATION SERVES AS A GREAT BENEFIT BECAUSE OUR… 7 min read·Jan 23, 2024 18 3 Khalid Chbail BUILDING A HOME SOC LAB (PART 1)- ELK STACK SIEM SOLUTION 7 min read·May 6, 2024 139 2 SOCFortress MASTERING WAZUH’S ACTIVE RESPONSE: BLOCK MALICIOUS IPS WITH COPILOT & WAZUH! 🤖 DOWNLOAD COPILOT: HTTPS://GITHUB.COM/SOCFORTRESS/COPILOT 3 min read·May 24, 2024 13 1 See more recommendations Help Status About Careers Press Blog Privacy Terms Text to speech Teams To make Medium work, we log user data. By using Medium, you agree to our Privacy Policy, including cookie policy.