Post

Cybersecurity Lab - Security Onion Setup

Full Security Onion setup guide (VMware)

Cybersecurity Lab - Security Onion Setup

By the end of this exercise, we will have:

  • Security Onion VM set up

Security Onion VM Setup

Security Onion ISO: https://securityonionsolutions.com/software/

I am on version 2.4.200

VM specs (recommended minimum):

  • 16GB Memory
  • 8 Processors
  • 200GB Storage
  • Network Adapters:
    • Adapter 1: SOC (10.10.3.0/24)
    • Adapter 2: DMZ

1

Boot the VM

Enter ‘yes’ to proceed

2

Enter an admin username and password. We will use these credentials to SSH into the VM.

3

installation should begin shortly after

4

Reboot the VM

5

Log in using the credentials from earlier

6

Yes

7

Install

8

Standalone

9

Standard

10

Set a hostname (or leave at default)

11

Since this is a lab environment running 1 Security Onion instance, the default hostname is fine

12

Select the SOC NIC as the management interface (ens160 in my case)

13

Set a static IP

14

I gave this VM the IP address 10.10.3.3.

15

Set the default gateway

16

Set the DNS server

17

Leave at default

18

Leave at direct

19

Yes

20

ens192 corresponds to the adapter that is attached to the DMZ network. Security Onion does not need (and shouldn’t have) an IP address on this network.

21

Create an admin account to log into the Security Onion console (web interface). This does not have to be a real email.

22

Select IP

23

Yes

24

Allow the entire SOC net

25

Make sure your configurations are correct before proceeding

26

The Security Onion installation will now begin. This may take a while (30-60 minutes)

27

After Security Onion is done setting up, we should be able to access the console

28

Security Onion Web Interface + Testing

From the Ubuntu VM, I generated some failed SSH logins.

29

When I head to the Security Onion web interface, my failed logins got logged

30

An alert was also created.

Security Onion offers lots of customization options and integrations, however this is fine for now. See Log Visibility. We will improve log visibility and detection capabilities over time, as we run attack simulations.

31

This post is licensed under CC BY 4.0 by the author.