<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>TomsBlog</title>
    <link>http://www.toms-blog.com/tags/vagrant/index.xml</link>
    <description>Recent content on TomsBlog</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-uk</language>
    <atom:link href="http://www.toms-blog.com/tags/vagrant/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>vDOS analysis with ELK stack and Vagrant</title>
      <link>http://www.toms-blog.com/post/vdos-analysis-elk-stack-vagrant/</link>
      <pubDate>Sun, 13 Nov 2016 15:48:19 +0000</pubDate>
      
      <guid>http://www.toms-blog.com/post/vdos-analysis-elk-stack-vagrant/</guid>
      <description>&lt;p&gt;vDOS was a booter service ran out of Israel allowing anyone to DDOS victims.
In July 2016 Brian Krebs obtained a database dump from the booter service giving insight into the techniques used and victims of the service.&lt;/p&gt;

&lt;p&gt;You can see Brian&amp;rsquo;s posts here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&#34;https://krebsonsecurity.com/2016/09/alleged-vdos-proprietors-arrested-in-israel/&#34;&gt;https://krebsonsecurity.com/2016/09/alleged-vdos-proprietors-arrested-in-israel/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href=&#34;https://krebsonsecurity.com/2016/09/israeli-online-attack-service-vdos-earned-600000-in-two-years/&#34;&gt;https://krebsonsecurity.com/2016/09/israeli-online-attack-service-vdos-earned-600000-in-two-years/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To analyse the database I&amp;rsquo;ve written a Vagrantfile which installs the ELK stack and uses logstash to put the vDOS log file into Elasticsearch, Kibana can then be used to analyse the data.&lt;/p&gt;

&lt;p&gt;The Vagrantfile and provision script can be found here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&#34;https://github.com/thomasweaver/vdos-elasticsearch-vagrant&#34;&gt;https://github.com/thomasweaver/vdos-elasticsearch-vagrant&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NOTE: The database is not provided here. You must obtain it yourself and copy it the vagrant folder with name attacks.txt&lt;/strong&gt;
&lt;strong&gt;The memory is set to 4GB in the Vagrantfile, make sure you have enough memory before doing a vagrant up&lt;/strong&gt;&lt;/p&gt;

&lt;div class=&#34;highlight&#34; style=&#34;background: #f0f3f3&#34;&gt;&lt;pre style=&#34;line-height: 125%&#34;&gt;&lt;span&gt;&lt;/span&gt;git clone https://github.com/thomasweaver/vdos-elasticsearch-vagrant.git
&lt;span style=&#34;color: #336666&#34;&gt;cd&lt;/span&gt; vdos-elasticsearch-vagrant
cp location-of-attack-database attacks.txt
vagrant up
&lt;/pre&gt;&lt;/div&gt;


&lt;p&gt;Kibana can then be access on&lt;/p&gt;

&lt;p&gt;&lt;a href=&#34;http://127.0.0.1:5601&#34;&gt;http://127.0.0.1:5601&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;http://www.toms-blog.com/images/posts/vdos-analysis/kibana-discover.JPG&#34; alt=&#34;Kibana vDOS analysis discover page&#34; /&gt;&lt;/p&gt;

&lt;p&gt;You can then search for your IP, ASN, Company Name or URL.&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;http://www.toms-blog.com/images/posts/vdos-analysis/kibana-google-inc-search.JPG&#34; alt=&#34;Kibana vDOS searching for attacks on Google&#34; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;http://www.toms-blog.com/images/posts/vdos-analysis/googleinc-log-details.JPG&#34; alt=&#34;Kibana vDOS Google Inc attack details&#34; /&gt;&lt;/p&gt;

&lt;p&gt;The above shows a search for &amp;ldquo;Google Inc&amp;rdquo; and then an individual log entry&lt;/p&gt;
</description>
    </item>
    
  </channel>
</rss>