In this part, I will show you how to setup the Security Onion SOC/SIEM and the endpoints that need to be monitored. In the next article we setup Splunk as our SIEM. As a pre-requesite for this article it is assumed you already have your endpoints configured and ready for Security Onion elastic agent endpoint .msi installations.

All of these parts have instructions that are cumulative for the home lab. You should be familiar with part one and part two before applying the instructions in part three (this article). If you haven’t already, check out part one and part two in this cyber home lab creation series.

Download ISO and VM Creation#

Download the Security Onion ISO from GitHub

Create the Security Onion VM Security Onion VM
configuration

See the Security Onion hardware requirements: https://docs.securityonion.net/en/2.4/hardware.html

I chose the standalone deployment therefore:

  • [Instead of the recommended 24GB of ram, I configured almost 28GB]
  • [4 CPU cores]
  • [500GB of storage, instead of the recommended minimum of 200GB]

Regarding networking:

  • [The first interface is vmbr1 (which is the sniffer bridge for the entire LAN network).]
  • [The second interface (vmbr1.20) is the management interface which exists on its own VLAN.]

Installation Steps#

Clarification: The steps below were done on Security Onion 2.3.290. But since then I have redone these steps on Security Onion 2.4.70. The installation steps are almost the same.

  1. Pick username/password

Pick whatever username/password you can remember. Obviously change the username and make the password secure if you’re using this in production!!!

  1. Log in with your credentials and you will see this screen:

  2. I recommend configuring networking first.

  1. Pick whatever hostname you like. Just make it memorable for configuration in upcoming steps.

Remember the Proxmox networking configuration in part one of our series:

  1. Select your managed NIC to be eth1 (vmbr1) since vmbr1.20 VLAN in within vmbr1. eth0 (vmbr0) is the monitored NIC and it does not have an IP address.

  1. Setup static addressing.

Pick an address that is within your vmbr1.20 VLAN subnet that we configured during pfSense setup in part two. In my case I picked 10.0.2.5.

  1. Configure gateway IP address

This is the gateway address that your pfSense VM is directly responsible for within your Blue Team VLAN.

  1. Setup DNS

I used the CloudFlare DNS servers.

  1. Setup search domain

My search domain is hive-mind.lan

  1. Decide your type of Installation

I picked standalone, but you may pick a different option depending on your needs.

The other installation steps are straightforward. One important thing to note is that the VPN subnet (10.0.5.0/24) should be added when asked for “Allowed IP or Subnet”, see final installation parameters below.

If you’re having issues with networking and need to run the installation again in the Security Onion command line console. This documentation may also help: https://docs.securityonion.net/en/2.4/proxmox.html

sudo SecurityOnion/setup/so-setup iso

If you’re still having issues with Security Onion not communicating with the pfSense router, I suggest troubleshooting by going up the OSI layer, starting at the physical layer (the NICs) and up to the application layer (DNS, HTTP, DHCP etc). For example a physical layer issue could be something simple such as you forgetting to plug in an ethernet cord from your switch to your router or from your switch to your Proxmox hardware. One network layer issue may be the router not being configured properly and you’re missing a default gateway for the Security Onion VLAN.

Here are my final installation parameters:

From my previous post in this home lab creation series, we know that vmbr1 is the bridge that sniffs the entire LAN.

If for whatever reason, eth0 was not configured during the installation to be the monitoring (sniffing/mirrored) NIC it can be added into Security Onion’s shell with the command below

sudo so-monitor-add eth0

eth1 is our Security Onion’s IP (the red box) and that IP will be used when we access Security Onion’s SOC interface on our browser.

Configuring Access to the SOC Console#

Connect to the VPN we created in part two.

The VPN subnet (10.0.5.0/24) has to be allowed through the security onion firewall. Remember, your main way to access your home lab is through the VPN we had defined with the firewall rules in part two of our home lab series.

sudo so-firewall includehost analyst <YOUR-VPN-IP>

Our SOC firewall rules need to be configured to allow three subnets on the console. Subnets (or individual IPs) also need to be added as endpoints that will be reporting to the Security Onion SOC.

For now, we are collecting logs from the Windows AD subnet and Vulnerable Web Server subnet. For firewall rules, we are allowing the Windows Victim and Vulnerable Web Server subnet alongside the VPN subnet through the firewall.

Note: we will configure the vulnerable web server subnet in a later article as the Linux container requires different steps.

This video is a good guide in setting up security onion endpoints:

https://www.youtube.com/watch?v=cGmQMsFuAvw&ab_channel=SecurityOnion

We allow the Vulnerable Web Server and Windows AD VLANs to send logs to Security Onion. If adding the subnets does not allow logs to come through, try adding the individual IPs (as a temporary solution).

After adding the elastic endpoint subnets, allow the vulnerable web server, Windows AD VLAN, and VPN subnets through the security onion firewall.

Alongside the Vulnerable Web Server and Windows AD VLAN we allow our VPN network through the firewall.

“Synchronize Grid” again. Give it about 5–10 minutes before downloading the installer files next.

Next we have to setup the endpoints that Security Onion will be monitoring.

Endpoint Setup#

Pre-requisites#

Download the installation media and follow the steps to create an ISO.

Load the proxmox drivers ISO into Proxmox’s database:

Creating the Windows DC “Hive-Mind”#

Make sure to boot up the Windows DC with the ISO and these hardware requisites:

The Windows_Server_2019.iso and Proxmox windows guest tools iso are loaded. The virtio toolkit helps with copy/pasting. Allowing cache write back to the processor and this improves performance.

For networking we have VLAN 40 on the subnet 10.0.4.0/24.

Active Directory DC Setup#

  1. Change the PC Name

  2. Elevate Server to a Domain Controller

  • Click “Manage” and then “Add Roles and Features”

  1. Click “next” in the wizard and make sure “role-based or feature based” installation is selected.

  2. When you come to the Select server roles window, make sure to select Active Directory Domain Services, and then click “Add Features”

  1. Keep clicking next and at the “Confirm installation selections” check “Restart the destination server automatically if requires.” Then click “yes” and “Install”

  1. Click on “Promote this server to a domain controller”.

  2. Specify root domain name. I used “hive-mind.lan” for my lab.

  1. On the next screen, enter a simple password you can remember (as this is an intentionally vulnerable AD lab!), keep it the same as your Admin password. We will be brute forcing and exploiting these passwords later on.

Your domain name should populate on the next screen

  1. Once you pass the “Prerequisites Check”, click “Install”

  2. After you reboot, log back in, you should see the server manager dashboard.

  3. Click on Manage -> Add roles and features -> Click next and make sure Role-based or feature-based installation is selected -> Click next until you get to server roles.

  4. On server roles make sure you select Active Directory Certificate Services. This role is used to verify identities in a domain controller, enhances security and allows use of LDAP[S]ecure. LDAP is needed for an AD build.

  1. Click Next until you reach the “Confirmation” window and select the option to restart your DC and then click “Install.”

  2. Once installation is finished click on Configure Active Directory Certificate Services on the destination server.

  3. Click Next, select Certification Authority and keep clicking next accepting the defaults.

  4. Set the validity period for a long time. Like 80 years for example.

  5. Get to the confirmation page, click Configure and reboot.

Install Proxmox Guest Tools on the Domain Controller#

Double click virtio-win-gt-x64, most likely your Windows Server installation is 64 bit and not 32 bit so click on the x64. If it is 32 bit click on the x86 version.

Windows DC (RDP) (Optional)#

I recommend enabling RDP on your new Windows DC for remote management as this makes everything much easier. My Windows Server VM was pretty sluggish so I used RDP to manage my Windows Server through my lab VPN.

Make sure RDP is enabled

Connect to your VPN first and then RDP to your AD-DC from your Windows box.

Setup AD DNS#

  1. Open up DNS Manager

  2. Right-click Reverse Lookup Zones in the left panel and select New Zone

  1. Follow the default settings recommended in the wizard until you are prompted for a Network ID, for which you should use the first three parts or octets of your Active Directory subnet address.

  1. After we create the zone we have to create a PTR record.

If you want to know your DC hostname definitively, type “hostname” in your command prompt.

Click Create New Pointer (PTR) with the following Name: IP of your DC and Data is the hostname of your DC and then your local domain name in this format: domain.tld.

Creating the Windows Desktop “Drones”#

For Windows 10 Pro download the installation media and follow the directions

You may need the virto drivers (in iso format) for your drives to be seen by the Windows installation software.

If you haven’t already, make sure you download the virtio drivers and load them into your Proxmox ISO storage: https://fedorapeople.org/groups/virt/virtio-win/direct-downloads/latest-virtio/virtio-win.iso

You also have to load the virtio ISO as an additional drive, see the screenshot below.

  1. On your Proxmox Hypervisor, click Create Virtual Machine.

Note: The options in the yellow are highly recommended as your Windows installation may need the drivers for the Proxmox hard disk to be “seen” by the Windows installation ISO.

  1. Enabling Write back on the cache helps with performance.

This is part of the Victim AD subnet (vmbr1.40) / VLAN 10.0.4.0/24.

Confirming configuration

  1. Power on your VM and run through the installation steps, you don’t need a product key, go on without it, and select Windows 10 Pro.

  1. Accept the License terms and click “Custom”

4a. If your allocated disk space doesn’t show up, we would have to load the virtio driver that we mounted alongside the iso in the new VM configuration.

A reminder of our previous step

Scroll down to the pass-through controller drivers You should get to this screen.

  1. Let the installation finish, log on to your windows desktop and install the virtio drivers as Admin.

  1. Check if the windows endpoint can ping the Security Onion SIEM IP.

Join Windows 10 Endpoint to the Hive-Mind AD#

  1. Enter Domain Admin credentials (created on the Windows 2019 server)

Connect to DC DNS Server#

Pointing Windows 10 to Windows Server DC as DNS Server

Windows Endpoint Logging Configuration#

The Windows 10 computers and Windows 2019 server need to be configured for monitoring with the Security Onion SOC. We need to download the installer files from the Security Onion Console, transfer it to our endpoints with a USB mapping through Proxmox and download it on the Windows devices to run the installers.

  1. We have to download these files for Windows:

Download the files to your host machine onto your USB.

Plug in our USB on the PVE hardware running Proxmox.

Click Add

Add the USB Hardware onto our Windows 2019 Server VM

On your Windows 2019 Server VM, you should be able to initiate the install.

  1. Make sure to run the elastic agent .exe as an administrator

Go to your security onion dashboard and you should see your AD-DC sending logs:

Side note: I was having issues with time syncing to my time zone on my Windows 2019 server, I used these commands to make it work:

w32tm /query /status
w32tm /unregister
net stop w32time
w32tm /register
net start w32time
w32tm /config /syncfromflags:manual /manualpeerlist:"0.us.pool.ntp.org,1.us.pool.ntp.org"
net stop w32tm && net start w32tm
w32tm /query /source w32tm /query /configuration

I rebooted to let the changes take effect.

Repeat the same endpoint configuration steps as above on the Windows 10 endpoint. You have to run the elastic agent with admin privileges and then check your Security Onion SOC console to see if the endpoint is sending events.

Back to Full Series.

References#

Security Onion Walkthrough on Youtube

Windows VirtIO Drivers – VirtIO Drivers are paravirtualized drivers for kvm/Linux

https://pve.proxmox.com/wiki/Windows_VirtIO_Drivers

https://fedorapeople.org/groups/virt/virtio-win/direct-downloads/latest-virtio/virtio-win.iso

https://download.securityonion.net/file/securityonion/securityonion-2.4.70-20240529.iso

Proxmox - Security Onion Documentation 2.4 documentation. If you’re going to install Security Onion in Proxmox and sniff live network traffic, you may need to do some additional research here.


If you found this article helpful and want to support me in my content creation then buy me a coffee