19 June 2012 | 3,702 views

Graphical Web Interface for OSSEC WUI AnaLogi v1.1

Check For Vulnerabilities with Acunetix

‘Analytical Log Interface’ was built to sit on top of OSSEC (built on OSSEC 2.6) and requires 0 modifications to OSSEC or the database schema that ships with OSSEC. AnaLogi requires a Webserver sporting PHP and MySQL.

Written for inhouse analysis work, released under GPL to give something back – it’s intended to help you spot trends in graphs from hosts/levels/ruleID breakdowns and then let the user drill down to the specific alerts.

AnaLogi v1.1

OSSEC is used for internal servers, therefore server names are treated as trusted and are not filtered for security within this project. For the same reason user input on the details page is not filtered… if you want to inject SQL, go ahead, you are the Sys Admin after all.

Log data IS treated as UNTRUSTED, and is validated before dumping to screen.

This was written and tested on a Virtual Machine, quad core, 4GB ram using a database with currently 1.2million alerts and 10 servers and performs fine.

If the interface gets slow over time you may want to consider your data retention period in the database and clean events out from time to time.

Download AnaLogi v1.1 here:

AnaLogi_v1.1.zip

Or read more here.



Recent in Countermeasures:
- isowall – Completely Isolate A Device From The Local Network
- ThreadFix – Vulnerability Aggregation & Management System
- StegExpose – Steganalysis Tool For Detecting Steganography In Images

Related Posts:
- OSSEC HIDS – Open Source Host-based Intrusion System
- Nessconnect 1.0.1 Released – GUI, CLI & API Client for Nessus
- Samhain v.2.5.9c – Open Source Host-Based Intrusion Detection System (HIDS)

Most Read in Countermeasures:
- AJAX: Is your application secure enough? - 119,312 views
- Password Hasher Firefox Extension - 117,127 views
- NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance - 57,579 views

Low-cost VPS Hosting

Comments are closed.