9131cae55d
- Removed neo4j install (replacing it with something that could scale) - Added creation of folder /op/helk and cron job in helk_install script - updated sysmon logstash script to grap intelligence from the new path /opt/helk/otx |
||
---|---|---|
data_science | ||
elasticsearch | ||
enrichments | ||
kibana | ||
logstash | ||
nginx | ||
scripts | ||
winlogbeat | ||
.gitignore | ||
LICENSE | ||
README.md | ||
docker-compose.yml |
README.md
HELK [Beta]
The incredible HELK (Hunting, Elasticsearch, Logstash, Kibana) VM.
Goals
- Provide a free hunting platform to the community and share the basics of Threat Hunting.
- Make sense of a large amount of event logs and add more context to suspicious events during hunting.
- Expedite the time it takes to deploy an ELK stack.
- Improve the testing of hunting use cases in an easier and more affordable way.
Resources
Getting Started
Requirements
- OS: Ubuntu-16.04.2 Server amd64 (Tested)
- Network Connection: NAT or Bridge
- RAM: 4GB (minimum)
- Applications:
- Docker & Docker-compose (Needed for HELK Docker Installation ONLY)
Installing Docker & Docker-compose
If you decide to build,(re)create, start and attach the specific containters needed for the HELK services (Elasticsearch, Logstash & Kibana), you will have to install Docker and Docker-compose first.
git clone https://github.com/Cyb3rWard0g/HELK.git
cd HELK/scripts
sudo ./helk_docker_install.sh
Enrichments?
You can use this basic HELK build and integrate it with other hunting platforms. So far you can use this build and integrate it with the following platforms:
Automated Collection and Enrichment (ACE)
ACE is a suite of tools for threat hunters to collect data from many endpoints in a network and automatically enrich the data. The data is collected by running scripts on each computer without installing any software on the target. ACE supports collecting from Windows, macOS, and Linux hosts. Once you have the HELK cloned locally, you will just have to update the custom ace-rabbimq-input.conf with your ACE-rabbitmq IP address,user & password. Then, you will ned to copy the custom ace-rabbitmq logstash configs to the HELK's default logstash/pipeline folder before installing it.
cd HELK
sudo nano enrichments/ACE/logstash/03-ace-rabbitmq-input.conf
sudo cp -a enrichments/ACE/logstash/* logstash/pipeline/
HELK Configuration & Installation
The HELK can be installed via a bash script or a docker-compose file. HELK will by default create a docker named volume helk_esdata
which will persist your elasticsearch data between containers. Additionally, HELK by default starts elasticsearch with 256mb of RAM allocated, if HELK will be used in higher resource environments, ES_JAVA_OPTS: "-Xmx256m -Xms256m"
can be modified in the docker-compose.yml, however do not allocate more than 50% of available memory. After installing the HELK, browse to your HELK (host) IP address and log on with
- username: helk
- password: hunting
Bash Script
sudo git clone https://github.com/Cyb3rWard0g/HELK.git
cd HELK/scripts
sudo ./helk_install.sh
Docker-compose
sudo git clone https://github.com/Cyb3rWard0g/HELK.git
cd HELK
sudo docker-compose up -d
Author
- Roberto Rodriguez @Cyb3rWard0g
Contributors
- Robby Winchester @robwinchester3
Contributing
There are a few things that I would like to accomplish with the HELK as shown in the To-Do list below, but I would also woult love to make the HELK a stable build for everyone in the community. If you are interested on making this build a more robust one and adding some cool features to it, PLEASE feel free to submit a pull request. #SharingIsCaring
TO-Do
- Integrate NGINX in the Docker image
- Upload Kibana Dashboards
- Add Winlogbeat scripts & files
- Add/Ingest samples logs to the HELK
- Install Elastalert
- Create Elastalert rules
More coming soon...