Главная
Study mode:
on
1
Intro
2
Who am I
3
Agenda
4
Environment
5
Topology
6
OpenBSD
7
Firewall
8
Host Name
9
PF Comm File
10
Custom Firewall Rules
11
Student Access Rules
12
Mirror Packet Length
13
Define Sources
14
Network Data
15
Windows Logs
16
System On Data
17
Scenarios
18
Public Internet
19
Exploit
20
Screenshot
21
Alerts
22
Unreal
23
Attack vector
24
CTF
25
Capture the Flag
26
Questions
27
ESXi
Description:
Explore the process of building a detection lab using SecurityOnion in this conference talk from Security Onion Conference 2019. Learn from Wylie Bayes as he covers essential topics including environment setup, topology, OpenBSD firewall configuration, custom firewall rules, student access rules, network data collection, Windows logs, and system data. Discover various scenarios such as public internet exploits, attack vectors, and Capture the Flag (CTF) exercises. Gain insights into alert management, unrealistic attack simulations, and ESXi implementation. This 32-minute presentation provides valuable knowledge for cybersecurity professionals looking to enhance their detection capabilities and create effective training environments.

Building a Detection Lab with SecurityOnion

Security Onion
Add to list