Download OSSEC
Author: k | 2025-04-24
Download OSSEC source code; Extract install OSSEC agent from source code; Installation of OSSEC HIDS Agent; Deploying OSSEC Agent to OSSEC server; Running OSSEC Agent; For Windows. Download OSSEC agent for Windows; Install OSSEC agent; Generate OSSEC key for the agent; Run and verify OSSEC agent is connected or running; Download OSSEC source code; Extract install OSSEC agent from source code; Installation of OSSEC HIDS Agent; Deploying OSSEC Agent to OSSEC server; Running OSSEC Agent; For Windows. Download OSSEC agent for Windows; Install OSSEC agent; Generate OSSEC key for the agent; Run and verify OSSEC agent is connected or running; Prerequisites. Ubuntu
OSSEC 2.9.1 - OSSEC
Skip to content Navigation Menu GitHub Copilot Write better code with AI Security Find and fix vulnerabilities Actions Automate any workflow Codespaces Instant dev environments Issues Plan and track work Code Review Manage code changes Discussions Collaborate outside of code Code Search Find more, search less Explore Learning Pathways Events & Webinars Ebooks & Whitepapers Customer Stories Partners Executive Insights GitHub Sponsors Fund open source developers The ReadME Project GitHub community articles Enterprise platform AI-powered developer platform Pricing Provide feedback Saved searches Use saved searches to filter your results more quickly ;ref_cta:Sign up;ref_loc:header logged out"}"> Sign up Overview Repositories Projects Packages People Popular repositories Loading OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response. C 4.6k 1.1k OSSEC Web User Interface - Unmaintained!! PHP 164 85 OSSEC Documentation HTML 138 99 A repository for OSSEC rules and decoders Python 54 19 OSSEC website on Github HTML 24 26 Repositories --> Type Select type All Public Sources Forks Archived Mirrors Templates Language Select language All C HTML JavaScript PHP Python Shell Sort Select order Last updated Name Stars Showing 10 of 12 repositories ossec/ossec-docs’s past year of commit activity ossec-hids Public OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response. ossec/ossec-hids’s past year of commit activity ossec-rules Public A repository for OSSEC rules and decoders ossec/ossec-rules’s past year of commit activity Python 54 19 0 0 Updated Aug 9, 2023 ossec/oum’s past year of commit activity Shell 4 AGPL-3.0 3 0 0 Updated Jun 1, 2023 kofe-docker Public KOFE (Kibana, OSSEC, Filebeat, and Elasticsearch) using Docker ossec/kofe-docker’s past year of commit activity Shell 7 5 2 1 Updated Nov 16, 2022 ossec/ossec-docker’s past year of commit activity Shell 58 39 3 3 Updated Feb 28, 2022 ossec-wui Public OSSEC Web User Interface - Unmaintained!! ossec/ossec-wui’s past year of commit activity ossec/ossec.github.io’s past year of commit activity HTML 24 26 1 3 Updated Feb 23, 2021 ossec/kofe’s past year of commit activity JavaScript 4 1 3 0 Updated Dec 13, 2020 ossec/archive-ossec.github.io-archive’s past year of commit activity HTML 2 5 0 1 Updated Oct 4, 2019 Most used topics Loading… -- 3.23.0.2 -- jungledisk-workgroup -- 3.23.0.2 -- -- text/xml malwarebytes -- 3.5.1.2522 -- malwarebytes -- 3.5.1.2522 -- messageanalyzer -- 4.0.7551.0 -- messageanalyzer -- 4.0.7551.0 -- messageanalyzer -- 4.0.7551.0 -- messageanalyzer -- 4.0.7551.0 -- miktex-basic -- 2.9 -- miktex-basic -- 2.9 -- miktex-basic -- 2.9 -- miktex-basic -- 2.9 -- ms-mbsa -- 2.3.2211 -- ms-mbsa -- 2.3.2211 -- ms-mbsa -- 2.3.2211 -- ms-mbsa -- 2.3.2211 -- ms-vcpp-2005-atl-redist_x64 -- 8.0.50727.42 -- ms-vcpp-2005-atl-redist_x64 -- 8.0.50727.42 -- ms-vcpp-2005-atl-redist_x86 -- 8.0.50727.42 -- ms-vcpp-2005-atl-redist_x86 -- 8.0.50727.42 -- ms-vcpp-2005-redist_x64 -- 8.0.56336 -- ms-vcpp-2005-redist_x64 -- 8.0.56336 -- ms-vcpp-2005-redist_x86 -- 8.0.56336 -- ms-vcpp-2005-redist_x86 -- 8.0.56336 -- mysql-installer-community -- 1.4.3.0 -- mysql-workbench-community -- 8.0.13 -- mysql-workbench-community -- 8.0.14 -- mysql-workbench-community -- 8.0.15 -- ntp -- 4.2.8p11 -- ntp -- 4.2.8p11 -- ntp -- 4.2.8p12 -- ntp -- 4.2.8p12 -- ntp -- 4.2.8p13 -- ntp -- 4.2.8p13 -- ntp -- 4.2.8p14 -- ntp -- 4.2.8p14 -- openvpn -- 2.3.10-I603 -- openvpn -- 2.3.10-I603 -- openvpn -- 2.3.11-I601 -- openvpn -- 2.3.11-I601 -- openvpn -- 2.3.12-I601 -- openvpn -- 2.3.12-I601 -- openvpn -- 2.3.17-I601 -- openvpn -- 2.3.17-I601 -- openvpn -- 2.3.6-I601 -- openvpn -- 2.3.6-I601 -- openvpn -- 2.3.8-I601 -- openvpn -- 2.3.8-I601 -- openvpn -- 2.4.3-I601 -- openvpn -- 2.4.3-I602 -- openvpn -- 2.4.4-I601 -- openvpn -- 2.4.5-I601 -- openvpn -- 2.4.6-I602 -- openvpn -- 2.4.7-I607-Win7 -- openvpn -- 2.4.8-I602-Win7 -- openvpn -- 2.4.9-I601-Win7 -- ossec-agent -- 2.9.0 -- ossec-agent -- 2.9.0 -- ossec-agent -- 2.9.2 -- ossec-agent -- 2.9.2 -- ossec-agent -- 2.9.3 -- ossec-agent -- 2.9.3 -- ossec-agent -- 2.9.4 -- ossec-agent -- 2.9.4 -- ossec-agent -- 3.0.0 -- ossec-agent -- 3.0.0 -- ossec-agent -- 3.0.1 -- ossec-agent -- 3.0.1 -- ossec-agent -- 3.1.0 -- ossec-agent -- 3.1.0 -- ossec-agent -- 3.2.0 -- ossec-agent -- 3.2.0 -- passware-kit-agent -- 13.1.7657 -- passware-kit-agent -- 13.1.7657 -- patchmypc-free -- 3.0.1.1 -- peazip -- 6.0.0 -- peazip -- 6.0.0 -- pgadmin4 -- 2.0 -- pgadmin4 -- 2.0 -- rakudo-star_x64 -- 1.0.0 -- rakudo-star_x86 -- 1.0.0 -- sandboxie -- 4.20 -- sandboxie -- 4.20 -- sandboxie -- 4.20 -- sandboxie -- 4.20 -- scaleout -- latest -- scaleout -- latest -- secunia.psi -- 3.0.0.10004 -- -- text/html;charset=utf-8 skype-msi -- 7.40.103 -- skype-msi -- 7.40.103 -- skype-msi -- 7.40.151 -- skype-msi -- 7.40.151 -- spybot -- 2.4 -- stellarium -- 0.16.1 -- stellarium -- 0.16.1 -- stellarium -- 0.16.1 -- stellarium -- 0.16.1 -- strawberryperl_x64 -- 5.24.3001 -- strawberryperl_x64 -- 5.26.1001 -- strawberryperl_x86 -- 5.24.3001 -- strawberryperl_x86 -- 5.26.1001 -- subinacl -- 5.2.3790.1164 -- subinacl -- 5.2.3790.1164 -- texmaker -- Not Found -- urlrewrite -- 7.2.1952 -- urlrewrite -- 7.2.1952 -- urlrewrite -- 7.2.1952 -- urlrewrite -- 7.2.1952 -- usbdlm -- 5.2.7.0 -- usbdlm -- 5.2.7.0 -- veyon -- 4.0.6 -- veyon -- 4.0.6 -- vsee -- 15.0.0.707 -- wamp-server-3 -- 3.1.3 -- wamp-server-3 -- 3.1.3 -- wamp-server-3 -- 3.1.3 -- wamp-server-3 -- 3.1.3 -- branches or pull requestsIssue actionsOSSEC 2.9.0 - OSSEC
Eventchannel7. Restart the Wazuh agent to apply the configuration changes by running the following PowerShell command as an administrator:> Restart-Service -Name wazuhWazuh serverPerform the following steps to configure detection rules on the Wazuh server.1. Create a new file /var/ossec/etc/rules/blx_stealer.xml:# touch /var/ossec/etc/rules/blx_stealer.xml2. Edit the file /var/ossec/etc/rules/blx_stealer.xml and include the following detection rules for BLX stealer: 92200 (?i)\\\\.+(exe|dll|bat|msi) (?i)\\\\temp.ps1 Possible BLX stealer activity detected: A rogue powershell script was dropped to system. T1105 92052 (?i)\\\\.+(exe|dll|bat|msi) (?i)\\\\Windows\\\\System32\\\\cmd.exe powershell.exe -ExecutionPolicy Bypass -File Possible BLX stealer activity detected: Rogue powershell script execution. T1059.003 92213 (?i)\\\\.+(exe|dll|bat|msi) (?i)\\\\Users\\\\[^\\\\]+\\\\AppData\\\\Local\\\\Temp\\\\decrypted_executable.exe Possible BLX stealer activity detected: Rogue executable was dropped to system. T1105 61613 (?i)\\\\Users\\\\[^\\\\]+\\\\AppData\\\\Local\\\\Temp\\\\decrypted_executable.exe (?i)\\\\Users\\\\[^\\\\]+\\\\AppData\\\\Roaming\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\decrypted_executable.exe Possible BLX stealer persistence activity detected: Rogue executable was copied to users' startup folder to establish persistence. T1547.001 Where:Rule 100300 is triggered when BLX drops a rogue PowerShell script, temp.ps1 to the infected system.Rule 100310 is triggered when BLX executes the temp.ps1 PowerShell script.Rule 100320 is triggered when BLX drops an executable, decrypted_executable.exe in the Temp folder.Rule 100330 is triggered when BLX copies the rogue executable to the user %Startup% folder for persistence.3. Restart the Wazuh manager service to apply the changes.# systemctl restart wazuh-managerVisualizing alerts on the Wazuh dashboardThe screenshot below shows the alerts generated on the Wazuh dashboard when we execute the BLX sample on the victim endpoints. Perform the following steps to view the alerts on the Wazuh dashboard.1. Navigate to Threat intelligence > Threat Hunting.2. Click + Add filter. Then, filter for rule.id in the Field field.3. Filter for is one of in the Operator field.4. Filter for 100300, 100310, 100320, and 100330 in the Values field.5. Click Save.YARA integrationYARA is an open source and multi-platform tool that identifies and classifies malware samples based on their textual or binary patterns. In this blog post, we use the Wazuh Active Response capability to automatically execute a YARA scan on files added or modified in the Downloads folder.Windows endpointTo download and install YARA, we require the following packages installed on the victim endpoint:Python v 3.13.0.Microsoft Visual C++ 2015 Redistributable.Note: Make sure to select the following checkboxes on the installer dialog box during Python installation: Use admin privileges when installing py.exe.Add Python.exe to PATH.After installing the above packages, perform the steps below to download the YARA executable:1. Launch PowerShell with administrative privilege and download YARA:> Invoke-WebRequest -Uri -OutFile v4.5.2-2326-win64.zip2. Extract the YARA executable:> Expand-Archive v4.5.2-2326-win64.zip3. Create a folder called C:\Program Files (x86)\ossec-agent\active-response\bin\yara\ and copy the YARA binary into it:> mkdir 'C:\Program Files (x86)\ossec-agent\active-response\bin\yara'> cp .\v4.5.2-2326-win64\yara64.exe 'C:\Program Files (x86)\ossec-agent\active-response\bin\yara'Perform the steps below to download YARA rules:4. Using the same PowerShell terminal launched earlier, install valhallaAPI using the pip utility. This allows you to query thousands of handcrafted YARA and Sigma rules in different. Download OSSEC source code; Extract install OSSEC agent from source code; Installation of OSSEC HIDS Agent; Deploying OSSEC Agent to OSSEC server; Running OSSEC Agent; For Windows. Download OSSEC agent for Windows; Install OSSEC agent; Generate OSSEC key for the agent; Run and verify OSSEC agent is connected or running;OSSEC 3.6.0 - OSSEC
6f 6e 65 5f 73 74 72 69 6e 67 } $str11 = { 49 63 4f 70 } $str12 = { 54 24 48 48 } $str13 = { 5c 24 30 48 } $str14 = { 5c 24 58 48 } $str15 = { 64 24 40 48 } $str16 = { 67 65 74 73 6f 63 6b 6f 70 74 } $str17 = { 73 74 72 65 73 73 20 74 68 65 20 47 43 20 63 6f 6d 70 61 63 74 6f 72 20 74 6f 20 66 6c 75 73 68 20 6f 75 74 20 62 75 67 73 20 28 69 6d 70 6c 69 65 73 20 2d 2d 66 6f 72 63 65 5f 6d 61 72 6b 69 6e 67 5f 64 65 71 75 65 5f 6f 76 65 72 66 6c 6f 77 73 29 } $str18 = { 74 24 38 48 } $str19 = { 74 24 60 48 } $blx_stealer_network = " ascii wide nocase $blx_stealer_network1 = " ascii wide nocase $blx_stealer_network2 = " ascii wide nocase $blx_stealer_hash1 = "8c4daf5e4ced10c3b7fd7c17c7c75a158f08867aeb6bccab6da116affa424a89" $blx_stealer_hash2 = "e74dac040ec85d4812b479647e11c3382ca22d6512541e8b42cf8f9fbc7b4af6" $blx_stealer_hash3 = "32abb4c0a362618d783c2e6ee2efb4ffe59a2a1000dadc1a6c6da95146c52881" $blx_stealer_hash4 = "5b46be0364d317ccd66df41bea068962d3aae032ec0c8547613ae2301efa75d6" condition: (all of ($str*) or any of ($blx_stealer_network*) or any of ($blx_stealer_hash*))}8. Edit the Wazuh agent file C:\Program Files (x86)\ossec-agent\ossec.conf and add the below configuration within the block to monitor the Downloads folders of all users in real-time:C:\Users\*\DownloadsNote: In this blog post, we monitor the Downloads folders of all users. However, you can configure other folders you intend to monitor.9. Create a batch file yara.bat in the C:\Program Files (x86)\ossec-agent\active-response\bin\ folder. The Wazuh active response module uses this file to perform YARA scans for malware detection and removal::: This script is meant to delete BLX Stealer and other malicious files matched by the YARA rules@echo offsetlocal enableDelayedExpansion:: Determine OS architecturereg Query "HKLM\Hardware\Description\System\CentralProcessor\0" | find /i "x86" > NUL && SET OS=32BIT || SET OS=64BITif %OS%==32BIT ( SET log_file_path="%programfiles%\ossec-agent\active-response\active-responses.log")if %OS%==64BIT ( SET log_file_path="%programfiles(x86)%\ossec-agent\active-response\active-responses.log"):: Read input from OSSEC agentset input=for /f "delims=" %%a in ('PowerShell -command "$logInput = Read-Host; Write-Output $logInput"') do ( set input=%%a):: File paths for operationsset json_file_path="C:\Program Files (x86)\ossec-agent\active-response\stdin.txt"set yara_exe_path="C:\Program Files (x86)\ossec-agent\active-response\bin\yara\yara64.exe"set yara_rules_path="C:\Program Files (x86)\ossec-agent\active-response\bin\yara\rules\yara_rules.yar"set syscheck_file_path=echo %input% > %json_file_path%FOR /F "tokens=* USEBACKQ" %%F IN (`Powershell -Nop -C "(Get-Content 'C:\Program Files (x86)\ossec-agent\active-response\stdin.txt'|ConvertFrom-Json).parameters.alert.syscheck.path"`) DO (SET syscheck_file_path=%%F)echo %syscheck_file_path% >> %log_file_path%:: Perform YARA scan on the detected filefor /f "delims=" %%a in ('powershell -command "& "%yara_exe_path%" "%yara_rules_path%" "%syscheck_file_path%""') do ( echo wazuh-yara: INFO - Scan result: %%a >> %log_file_path% :: Deleting the scanned file. del /f "%syscheck_file_path%" echo wazuh-yara: INFO - Successfully deleted: %%a >> %log_file_path%)exit /b10. Restart the Wazuh agent to apply the changes:> Restart-Service -Name wazuhWazuh serverPerform the following steps to configure custom Essential tool for protecting the network layer and identifying threats that may be trying to penetrate the organization’s defenses.Suricata’s deep packet inspection (DPI) capability allows it to go beyond simply analyzing headers and surface-level data. By inspecting the actual contents of packets, Suricata can identify hidden threats within files or encrypted traffic. This makes it particularly useful in environments where attackers might try to obfuscate their activities through complex payloads or encrypted channels.OSSEC’s Strength in Endpoint SecurityOn the other hand, OSSEC is focused on monitoring individual hosts for signs of intrusion or compromise. It does this by analyzing log files, monitoring file integrity, detecting rootkits, and watching for policy violations. OSSEC’s focus on the host level allows it to detect insider threats, malware, or misconfigurations that may not be visible from a network perspective. By monitoring specific systems, OSSEC can detect threats such as unauthorized changes to critical files, suspicious user behavior, or abnormal system activity.In this sense, OSSEC complements tools like Suricata by providing endpoint-level visibility. While Suricata watches for threats entering or moving through the network, OSSEC ensures that the endpoints themselves remain secure from internal or localized threats. OSSEC also offers a centralized logging system, which collects data from multiple endpoints, providing a broader view of system activity across the network.When to Use Suricata vs OSSECThe decision between Suricata and OSSEC depends largely on the organization’s security needs. For businesses primarily concerned with securing their network perimeter, Suricata is the better choice, as it provides comprehensive network traffic monitoring and can block threats before they reach critical systems. Suricata’s IPS functionality is particularly valuable for companies that need proactive threat prevention in addition to detection.OSSEC, on the other hand, is ideal for organizations that require deep visibility into their endpoints. It is particularly effective in environments where insider threats, file integrity, and configuration management are top concerns. OSSEC’s focus on host-based monitoring makes it an excellent tool for protecting individual systems and ensuring compliance with internal security policies.In many cases, organizations may choose to deploy both Suricata and OSSEC as part of a layered security strategy. SuricataOSSEC 3.0.0 - OSSEC
The /var/ossec/bin/agent_control tool on the Wazuh server, used with -l option, allows for the retrieval of a list of the available Wazuh agents:# /var/ossec/bin/agent_control -lWazuh agent_control. List of available agents: ID: 000, Name: vpc-ossec-manager (server), IP: 127.0.0.1, Active/Local ID: 1040, Name: ip-10-0-0-76, IP: 10.0.0.76, Active ID: 003, Name: vpc-agent-debian, IP: 10.0.0.121, Active ID: 005, Name: vpc-agent-ubuntu-public, IP: 10.0.0.126, Active ID: 006, Name: vpc-agent-windows, IP: 10.0.0.124, Active ID: 1024, Name: ip-10-0-0-252, IP: 10.0.0.252, Never connected ID: 1028, Name: vpc-debian-it, IP: any, Never connected ID: 1030, Name: diamorphine-POC, IP: 10.0.0.59, Active ID: 015, Name: vpc-agent-centos, IP: 10.0.0.123, Active ID: 1031, Name: WIN-UENN0U6R5SF, IP: 10.0.0.124, Never connected ID: 1032, Name: vpc-agent-ubuntu, IP: 10.0.0.122, Active ID: 1033, Name: vpc-agent-debian8, IP: 10.0.0.128, Active ID: 1034, Name: vpc-agent-redhat, IP: 10.0.0.127, Active ID: 1035, Name: vpc-agent-centos7, IP: 10.0.0.101, Never connected ID: 1041, Name: vpc-agent-centos-public, IP: 10.0.0.125, ActiveList of agentless devices: ID: 010, Name: agentless-ubuntu, IP: 10.0.0.135, ActiveAlso, users can retrieve a list of the connected agents by using the /var/ossec/bin/manage_agents tool with -l option:# /var/ossec/bin/manage_agents -lAvailable agents: ID: 001, Name: agent-ubuntu2, IP: any ID: 002, Name: agent-ubuntu1, IP: anyOSSEC 3.1.0 - OSSEC
Formats, filter them, and write them to disk.> pip install valhallaAPI5. Create the file download_yara_rules.py and copy the following script into it:from valhallaAPI.valhalla import ValhallaAPIv = ValhallaAPI(api_key="1111111111111111111111111111111111111111111111111111111111111111")response = v.get_rules_text()with open('yara_rules.yar', 'w') as fh: fh.write(response)6. Download YARA rules and copy them to the C:\Program Files (x86)\ossec-agent\active-response\bin\yara\rules\ folder:> python download_yara_rules.py > mkdir 'C:\Program Files (x86)\ossec-agent\active-response\bin\yara\rules'>cp yara_rules.yar 'C:\Program Files (x86)\ossec-agent\active-response\bin\yara\rules'7. Edit the file C:\Program Files (x86)\ossec-agent\active-response\bin\yara\rules\yara_rules.yar and add the following YARA rule to detect BLX stealer:rule BLX_Stealer_rule { meta: description = "Detects BLX Stealer malware" author = "Wazuh" date = "2024-11-01" reference = " strings: $str0 = { 20 20 20 20 70 6f 6c 69 63 79 2e 6d 61 6e 69 66 65 73 74 2e 61 73 73 65 72 74 49 6e 74 65 67 72 69 74 79 28 6d 6f 64 75 6c 65 55 52 4c 2c 20 63 6f 6e 74 65 6e 74 29 3b } $str1 = { 20 20 41 72 72 61 79 50 72 6f 74 6f 74 79 70 65 53 68 69 66 74 2c } $str2 = { 20 20 69 66 20 28 21 73 74 61 74 65 2e 6b 65 65 70 41 6c 69 76 65 54 69 6d 65 6f 75 74 53 65 74 29 } $str3 = { 20 20 72 65 74 75 72 6e 20 72 65 71 75 69 72 65 28 27 74 6c 73 27 29 2e 44 45 46 41 55 4c 54 5f 43 49 50 48 45 52 53 3b } $str4 = { 21 47 7e 79 5f 3b } $str5 = { 3f 52 65 64 75 63 65 53 74 61 72 74 40 42 72 61 6e 63 68 45 6c 69 6d 69 6e 61 74 69 6f 6e 40 63 6f 6d 70 69 6c 65 72 40 69 6e 74 65 72 6e 61 6c 40 76 38 40 40 41 45 41 41 3f 41 56 52 65 64 75 63 74 69 6f 6e 40 32 33 34 40 50 45 41 56 4e 6f 64 65 40 32 33 34 40 40 5a } $str6 = { 40 55 56 57 48 } $str7 = { 41 49 5f 41 44 44 52 43 4f 4e 46 49 47 } $str8 = { 44 24 70 48 } $str9 = { 45 56 50 5f 4d 44 5f 43 54 58 5f 73 65 74 5f 75 70 64 61 74 65 5f 66 6e } $str10 = { 46 61 69 6c 65 64 20 74 6f 20 64 65 73 65 72 69 61 6c 69 7a 65 20 64. Download OSSEC source code; Extract install OSSEC agent from source code; Installation of OSSEC HIDS Agent; Deploying OSSEC Agent to OSSEC server; Running OSSEC Agent; For Windows. Download OSSEC agent for Windows; Install OSSEC agent; Generate OSSEC key for the agent; Run and verify OSSEC agent is connected or running;OSSEC 2.9.2 - OSSEC
Ensures that it can detect a wide range of threats as they emerge.On the other hand, Zeek is better suited for organizations that require in-depth traffic analysis and long-term visibility into network behavior. Zeek provides security teams with detailed logs that can be used to analyze incidents after they occur, making it particularly useful in forensic investigations. It also excels in environments where network performance monitoring is important, as Zeek’s data collection can help identify bottlenecks or unusual traffic patterns that may indicate underlying issues.Zeek as a Zeek Alternative to SnortFor organizations that need comprehensive network monitoring but may not require real-time threat blocking, Zeek can serve as an alternative to Snort. While Zeek does not offer the same signature-based detection, its strength lies in its ability to profile network traffic and detect anomalies over time. This makes Zeek a valuable alternative for companies that prioritize threat hunting and deep analysis over immediate detection.However, many organizations opt to use both tools in tandem. By combining Snort’s signature-based detection with Zeek’s traffic analysis capabilities, organizations can achieve a more balanced approach to network security. Snort can handle immediate detection of known threats, while Zeek captures the broader network context, enabling more thorough investigation and detection of zero-day threats or attacks that may not yet have signatures.ALSO READ: Different Kinds of Isolation in CybersecuritySuricata vs OSSECSuricata vs OSSEC for Intrusion DetectionSuricata and OSSEC are both powerful open-source tools used for intrusion detection, but they serve different purposes within a network security strategy. While Suricata functions as a network-based intrusion detection system (NIDS), OSSEC is primarily a host-based intrusion detection system (HIDS). The key distinction here is that Suricata monitors network traffic, while OSSEC focuses on individual endpoints such as servers, workstations, or devices.Suricata’s Strength in Network SecuritySuricata is built to monitor and analyze traffic across entire networks. It excels at detecting malicious patterns in network data, using signatures and rules to detect known threats in real-time. Suricata can operate as both an IDS and IPS, meaning it can either passively monitor network activity or actively block suspicious traffic. This makes it anComments
Skip to content Navigation Menu GitHub Copilot Write better code with AI Security Find and fix vulnerabilities Actions Automate any workflow Codespaces Instant dev environments Issues Plan and track work Code Review Manage code changes Discussions Collaborate outside of code Code Search Find more, search less Explore Learning Pathways Events & Webinars Ebooks & Whitepapers Customer Stories Partners Executive Insights GitHub Sponsors Fund open source developers The ReadME Project GitHub community articles Enterprise platform AI-powered developer platform Pricing Provide feedback Saved searches Use saved searches to filter your results more quickly ;ref_cta:Sign up;ref_loc:header logged out"}"> Sign up Overview Repositories Projects Packages People Popular repositories Loading OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response. C 4.6k 1.1k OSSEC Web User Interface - Unmaintained!! PHP 164 85 OSSEC Documentation HTML 138 99 A repository for OSSEC rules and decoders Python 54 19 OSSEC website on Github HTML 24 26 Repositories --> Type Select type All Public Sources Forks Archived Mirrors Templates Language Select language All C HTML JavaScript PHP Python Shell Sort Select order Last updated Name Stars Showing 10 of 12 repositories ossec/ossec-docs’s past year of commit activity ossec-hids Public OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response. ossec/ossec-hids’s past year of commit activity ossec-rules Public A repository for OSSEC rules and decoders ossec/ossec-rules’s past year of commit activity Python 54 19 0 0 Updated Aug 9, 2023 ossec/oum’s past year of commit activity Shell 4 AGPL-3.0 3 0 0 Updated Jun 1, 2023 kofe-docker Public KOFE (Kibana, OSSEC, Filebeat, and Elasticsearch) using Docker ossec/kofe-docker’s past year of commit activity Shell 7 5 2 1 Updated Nov 16, 2022 ossec/ossec-docker’s past year of commit activity Shell 58 39 3 3 Updated Feb 28, 2022 ossec-wui Public OSSEC Web User Interface - Unmaintained!! ossec/ossec-wui’s past year of commit activity ossec/ossec.github.io’s past year of commit activity HTML 24 26 1 3 Updated Feb 23, 2021 ossec/kofe’s past year of commit activity JavaScript 4 1 3 0 Updated Dec 13, 2020 ossec/archive-ossec.github.io-archive’s past year of commit activity HTML 2 5 0 1 Updated Oct 4, 2019 Most used topics Loading…
2025-04-12-- 3.23.0.2 -- jungledisk-workgroup -- 3.23.0.2 -- -- text/xml malwarebytes -- 3.5.1.2522 -- malwarebytes -- 3.5.1.2522 -- messageanalyzer -- 4.0.7551.0 -- messageanalyzer -- 4.0.7551.0 -- messageanalyzer -- 4.0.7551.0 -- messageanalyzer -- 4.0.7551.0 -- miktex-basic -- 2.9 -- miktex-basic -- 2.9 -- miktex-basic -- 2.9 -- miktex-basic -- 2.9 -- ms-mbsa -- 2.3.2211 -- ms-mbsa -- 2.3.2211 -- ms-mbsa -- 2.3.2211 -- ms-mbsa -- 2.3.2211 -- ms-vcpp-2005-atl-redist_x64 -- 8.0.50727.42 -- ms-vcpp-2005-atl-redist_x64 -- 8.0.50727.42 -- ms-vcpp-2005-atl-redist_x86 -- 8.0.50727.42 -- ms-vcpp-2005-atl-redist_x86 -- 8.0.50727.42 -- ms-vcpp-2005-redist_x64 -- 8.0.56336 -- ms-vcpp-2005-redist_x64 -- 8.0.56336 -- ms-vcpp-2005-redist_x86 -- 8.0.56336 -- ms-vcpp-2005-redist_x86 -- 8.0.56336 -- mysql-installer-community -- 1.4.3.0 -- mysql-workbench-community -- 8.0.13 -- mysql-workbench-community -- 8.0.14 -- mysql-workbench-community -- 8.0.15 -- ntp -- 4.2.8p11 -- ntp -- 4.2.8p11 -- ntp -- 4.2.8p12 -- ntp -- 4.2.8p12 -- ntp -- 4.2.8p13 -- ntp -- 4.2.8p13 -- ntp -- 4.2.8p14 -- ntp -- 4.2.8p14 -- openvpn -- 2.3.10-I603 -- openvpn -- 2.3.10-I603 -- openvpn -- 2.3.11-I601 -- openvpn -- 2.3.11-I601 -- openvpn -- 2.3.12-I601 -- openvpn -- 2.3.12-I601 -- openvpn -- 2.3.17-I601 -- openvpn -- 2.3.17-I601 -- openvpn -- 2.3.6-I601 -- openvpn -- 2.3.6-I601 -- openvpn -- 2.3.8-I601 -- openvpn -- 2.3.8-I601 -- openvpn -- 2.4.3-I601 -- openvpn -- 2.4.3-I602 -- openvpn -- 2.4.4-I601 -- openvpn -- 2.4.5-I601 -- openvpn -- 2.4.6-I602 -- openvpn -- 2.4.7-I607-Win7 -- openvpn -- 2.4.8-I602-Win7 -- openvpn -- 2.4.9-I601-Win7 -- ossec-agent -- 2.9.0 -- ossec-agent -- 2.9.0 -- ossec-agent -- 2.9.2 -- ossec-agent -- 2.9.2 -- ossec-agent -- 2.9.3 -- ossec-agent -- 2.9.3 -- ossec-agent -- 2.9.4 -- ossec-agent -- 2.9.4 -- ossec-agent -- 3.0.0 -- ossec-agent -- 3.0.0 -- ossec-agent -- 3.0.1 -- ossec-agent -- 3.0.1 -- ossec-agent -- 3.1.0 -- ossec-agent -- 3.1.0 -- ossec-agent -- 3.2.0 -- ossec-agent -- 3.2.0 -- passware-kit-agent -- 13.1.7657 -- passware-kit-agent -- 13.1.7657 -- patchmypc-free -- 3.0.1.1 -- peazip -- 6.0.0 -- peazip -- 6.0.0 -- pgadmin4 -- 2.0 -- pgadmin4 -- 2.0 -- rakudo-star_x64 -- 1.0.0 -- rakudo-star_x86 -- 1.0.0 -- sandboxie -- 4.20 -- sandboxie -- 4.20 -- sandboxie -- 4.20 -- sandboxie -- 4.20 -- scaleout -- latest -- scaleout -- latest -- secunia.psi -- 3.0.0.10004 -- -- text/html;charset=utf-8 skype-msi -- 7.40.103 -- skype-msi -- 7.40.103 -- skype-msi -- 7.40.151 -- skype-msi -- 7.40.151 -- spybot -- 2.4 -- stellarium -- 0.16.1 -- stellarium -- 0.16.1 -- stellarium -- 0.16.1 -- stellarium -- 0.16.1 -- strawberryperl_x64 -- 5.24.3001 -- strawberryperl_x64 -- 5.26.1001 -- strawberryperl_x86 -- 5.24.3001 -- strawberryperl_x86 -- 5.26.1001 -- subinacl -- 5.2.3790.1164 -- subinacl -- 5.2.3790.1164 -- texmaker -- Not Found -- urlrewrite -- 7.2.1952 -- urlrewrite -- 7.2.1952 -- urlrewrite -- 7.2.1952 -- urlrewrite -- 7.2.1952 -- usbdlm -- 5.2.7.0 -- usbdlm -- 5.2.7.0 -- veyon -- 4.0.6 -- veyon -- 4.0.6 -- vsee -- 15.0.0.707 -- wamp-server-3 -- 3.1.3 -- wamp-server-3 -- 3.1.3 -- wamp-server-3 -- 3.1.3 -- wamp-server-3 -- 3.1.3 -- branches or pull requestsIssue actions
2025-03-26Eventchannel7. Restart the Wazuh agent to apply the configuration changes by running the following PowerShell command as an administrator:> Restart-Service -Name wazuhWazuh serverPerform the following steps to configure detection rules on the Wazuh server.1. Create a new file /var/ossec/etc/rules/blx_stealer.xml:# touch /var/ossec/etc/rules/blx_stealer.xml2. Edit the file /var/ossec/etc/rules/blx_stealer.xml and include the following detection rules for BLX stealer: 92200 (?i)\\\\.+(exe|dll|bat|msi) (?i)\\\\temp.ps1 Possible BLX stealer activity detected: A rogue powershell script was dropped to system. T1105 92052 (?i)\\\\.+(exe|dll|bat|msi) (?i)\\\\Windows\\\\System32\\\\cmd.exe powershell.exe -ExecutionPolicy Bypass -File Possible BLX stealer activity detected: Rogue powershell script execution. T1059.003 92213 (?i)\\\\.+(exe|dll|bat|msi) (?i)\\\\Users\\\\[^\\\\]+\\\\AppData\\\\Local\\\\Temp\\\\decrypted_executable.exe Possible BLX stealer activity detected: Rogue executable was dropped to system. T1105 61613 (?i)\\\\Users\\\\[^\\\\]+\\\\AppData\\\\Local\\\\Temp\\\\decrypted_executable.exe (?i)\\\\Users\\\\[^\\\\]+\\\\AppData\\\\Roaming\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\decrypted_executable.exe Possible BLX stealer persistence activity detected: Rogue executable was copied to users' startup folder to establish persistence. T1547.001 Where:Rule 100300 is triggered when BLX drops a rogue PowerShell script, temp.ps1 to the infected system.Rule 100310 is triggered when BLX executes the temp.ps1 PowerShell script.Rule 100320 is triggered when BLX drops an executable, decrypted_executable.exe in the Temp folder.Rule 100330 is triggered when BLX copies the rogue executable to the user %Startup% folder for persistence.3. Restart the Wazuh manager service to apply the changes.# systemctl restart wazuh-managerVisualizing alerts on the Wazuh dashboardThe screenshot below shows the alerts generated on the Wazuh dashboard when we execute the BLX sample on the victim endpoints. Perform the following steps to view the alerts on the Wazuh dashboard.1. Navigate to Threat intelligence > Threat Hunting.2. Click + Add filter. Then, filter for rule.id in the Field field.3. Filter for is one of in the Operator field.4. Filter for 100300, 100310, 100320, and 100330 in the Values field.5. Click Save.YARA integrationYARA is an open source and multi-platform tool that identifies and classifies malware samples based on their textual or binary patterns. In this blog post, we use the Wazuh Active Response capability to automatically execute a YARA scan on files added or modified in the Downloads folder.Windows endpointTo download and install YARA, we require the following packages installed on the victim endpoint:Python v 3.13.0.Microsoft Visual C++ 2015 Redistributable.Note: Make sure to select the following checkboxes on the installer dialog box during Python installation: Use admin privileges when installing py.exe.Add Python.exe to PATH.After installing the above packages, perform the steps below to download the YARA executable:1. Launch PowerShell with administrative privilege and download YARA:> Invoke-WebRequest -Uri -OutFile v4.5.2-2326-win64.zip2. Extract the YARA executable:> Expand-Archive v4.5.2-2326-win64.zip3. Create a folder called C:\Program Files (x86)\ossec-agent\active-response\bin\yara\ and copy the YARA binary into it:> mkdir 'C:\Program Files (x86)\ossec-agent\active-response\bin\yara'> cp .\v4.5.2-2326-win64\yara64.exe 'C:\Program Files (x86)\ossec-agent\active-response\bin\yara'Perform the steps below to download YARA rules:4. Using the same PowerShell terminal launched earlier, install valhallaAPI using the pip utility. This allows you to query thousands of handcrafted YARA and Sigma rules in different
2025-04-226f 6e 65 5f 73 74 72 69 6e 67 } $str11 = { 49 63 4f 70 } $str12 = { 54 24 48 48 } $str13 = { 5c 24 30 48 } $str14 = { 5c 24 58 48 } $str15 = { 64 24 40 48 } $str16 = { 67 65 74 73 6f 63 6b 6f 70 74 } $str17 = { 73 74 72 65 73 73 20 74 68 65 20 47 43 20 63 6f 6d 70 61 63 74 6f 72 20 74 6f 20 66 6c 75 73 68 20 6f 75 74 20 62 75 67 73 20 28 69 6d 70 6c 69 65 73 20 2d 2d 66 6f 72 63 65 5f 6d 61 72 6b 69 6e 67 5f 64 65 71 75 65 5f 6f 76 65 72 66 6c 6f 77 73 29 } $str18 = { 74 24 38 48 } $str19 = { 74 24 60 48 } $blx_stealer_network = " ascii wide nocase $blx_stealer_network1 = " ascii wide nocase $blx_stealer_network2 = " ascii wide nocase $blx_stealer_hash1 = "8c4daf5e4ced10c3b7fd7c17c7c75a158f08867aeb6bccab6da116affa424a89" $blx_stealer_hash2 = "e74dac040ec85d4812b479647e11c3382ca22d6512541e8b42cf8f9fbc7b4af6" $blx_stealer_hash3 = "32abb4c0a362618d783c2e6ee2efb4ffe59a2a1000dadc1a6c6da95146c52881" $blx_stealer_hash4 = "5b46be0364d317ccd66df41bea068962d3aae032ec0c8547613ae2301efa75d6" condition: (all of ($str*) or any of ($blx_stealer_network*) or any of ($blx_stealer_hash*))}8. Edit the Wazuh agent file C:\Program Files (x86)\ossec-agent\ossec.conf and add the below configuration within the block to monitor the Downloads folders of all users in real-time:C:\Users\*\DownloadsNote: In this blog post, we monitor the Downloads folders of all users. However, you can configure other folders you intend to monitor.9. Create a batch file yara.bat in the C:\Program Files (x86)\ossec-agent\active-response\bin\ folder. The Wazuh active response module uses this file to perform YARA scans for malware detection and removal::: This script is meant to delete BLX Stealer and other malicious files matched by the YARA rules@echo offsetlocal enableDelayedExpansion:: Determine OS architecturereg Query "HKLM\Hardware\Description\System\CentralProcessor\0" | find /i "x86" > NUL && SET OS=32BIT || SET OS=64BITif %OS%==32BIT ( SET log_file_path="%programfiles%\ossec-agent\active-response\active-responses.log")if %OS%==64BIT ( SET log_file_path="%programfiles(x86)%\ossec-agent\active-response\active-responses.log"):: Read input from OSSEC agentset input=for /f "delims=" %%a in ('PowerShell -command "$logInput = Read-Host; Write-Output $logInput"') do ( set input=%%a):: File paths for operationsset json_file_path="C:\Program Files (x86)\ossec-agent\active-response\stdin.txt"set yara_exe_path="C:\Program Files (x86)\ossec-agent\active-response\bin\yara\yara64.exe"set yara_rules_path="C:\Program Files (x86)\ossec-agent\active-response\bin\yara\rules\yara_rules.yar"set syscheck_file_path=echo %input% > %json_file_path%FOR /F "tokens=* USEBACKQ" %%F IN (`Powershell -Nop -C "(Get-Content 'C:\Program Files (x86)\ossec-agent\active-response\stdin.txt'|ConvertFrom-Json).parameters.alert.syscheck.path"`) DO (SET syscheck_file_path=%%F)echo %syscheck_file_path% >> %log_file_path%:: Perform YARA scan on the detected filefor /f "delims=" %%a in ('powershell -command "& "%yara_exe_path%" "%yara_rules_path%" "%syscheck_file_path%""') do ( echo wazuh-yara: INFO - Scan result: %%a >> %log_file_path% :: Deleting the scanned file. del /f "%syscheck_file_path%" echo wazuh-yara: INFO - Successfully deleted: %%a >> %log_file_path%)exit /b10. Restart the Wazuh agent to apply the changes:> Restart-Service -Name wazuhWazuh serverPerform the following steps to configure custom
2025-03-30