3 hours 10 minutes
Hey, folks, welcome to lessen five of intro to security Onion. I'm your instructor, Carl. And in this lesson, we will review what we installed on our standalone server.
So for the agenda,
first will view the system status with S O stat.
Then we'll take a look at the tools that are accessible through our browser.
Next, we will look at applications that are only accessible from either the manager or a V M.
And then we'll wrap up with a review of what tools are accessible via a terminal
whole. Right? So let's get started. So first things first. When I initially installed the virtual machine on my laptop, I mentioned that in order for Cabana or the elastic stacks work properly, you had to give it eight gigabytes. But my laptop only has eight gigabytes
to begin with, so I wasn't able to give it the full amount that's needed for it to run.
I was hoping that for this demonstration it would be all right, but
so. I migrated that virtual machine that we created overto a virtual ization server that I have,
and that one is a running virtual box, as you can see here. This is the web interface for that or for virtual box. And this is the virtual machine that we set up. As you can see, I changed it its memory to eight gigabytes here.
And I also changed it from Nat to abridged adapter. That means that
I It is assigned a kn i p address on my home network. And because I did that I can s s h into it through putty and I can also rdp into it. And here you can see where I already peed in tow it. In order to do that, I installed X r d p.
And to make it work properly, I had to install a different desk
In this case, it is the x f c E desktop. While it looks a little bit different than the regular security onion desktop,
it works just fine. It works just the same, so we'll continue on with our demonstration from here
Using Snort and Wireshark to Analyze Traffic
The Using Snort and Wireshark to Analyze Traffic virtual lab from CybrScore guides the student ...
The IDS Setup virtual lab from CybrScore guides the student through setting up an intrusion ...