Francesco Emulo

I hope my portfolio can inspire you!

Download as .zip Download as .tar.gz View on GitHub

Let’s trigger some security events

To verify that the agent is working correctly, you can generate some security-related events on your Kali VM. To do this, we can use a tool like Nmap. Nmap can be used to scan hosts for open ports, determine the operating system and software running on the target system, and gather other information about the network.

Since we are using only one virtual machine, we can make a scan towards our localhost (you can see it by typing ip a in the terminal, the loopback is 127.0.0.1) trying to add various objects to the command.

Add Integrations

Querying for Security Events in the Elastic SIEM

Now that we have forwarded data from the Kali VM to the SIEM, we can start querying and analyzing the logs in the SIEM. Inside your Elastic Deployment, click on the menu icon at the top-left with the three horizontal lines and then click on the “Logs” tab under “Observability” to view the logs from the Kali VM.

Add Integrations

We can enter in the search bar a query to filter the logs, for example, event.action:”nmap” Click on “Search” button to execute the search query (it can take a while for the events to populate and show up on the SIEM).

You will see something like this:

Add Integrations

By moving the mouse cursor over an event, three dots will appear on the left, by clicking them you can get information about the host IP, the command executed and similar.

Add Integrations Add Integrations

You can continue with chapter 3!.