5.4 Security Onion Terminal
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
3 hours 10 minutes
All right. So for the last part of abyss lesson, we will
quickly go over a couple of the tools that are
only accessible through the terminal.
on security onion. If you go into applications other, it'll show you
several of the man pages that air available for security onion terminal tools.
But since I installed this different desktop,
it is giving different options. So
I have our one installed on local host here that we can take a quick look through.
and then all of the man pages that are available to us. So that means that all of these tools are installed.
So, for example, we have our chaos. Reader man Paige
should open up a terminal. Yeah,
So here we have our man paid or our manual for chaos. Reader chaos reader being ah, interesting tool that you can run a pea cap through
and it'll horse it all out and give you Ah,
nice. Each team male daki h h TML documents that you can
open up a new browser end,
we have other things like drift net de sniff h peeing
and grab. So network grab
escapee. If you want to *** some packets you can use? KP
Sniff it, man. Paige s s seldom.
Then TCP dump has always ah,
good tool for replaying or capturing traffic
It's good for
working with Net flows.
T shark. That's the terminal version of wire shark. So
there are some pretty interesting tools that air installed on security onion.
We, of course, can't go into all of them. I think that we'd be here for quite a while if we worked through each of these tools. But I, of course, encourage you to
go through them, learn, learn everything that you can and
see what works for you.
In this lesson, we covered how we convert you. The running service is on your security, Onion Instance. How to view tools that are accessible through your browser on a manager or VM and what tools are available in the terminal.
Thanks so much for watching In our next lesson, we will cover some off. The resource is that are available to make your life easier when working with security onion. See you then J's