Brought to you by Active Countermeasures.
BeaKer visualizes Microsoft Sysmon network data to help threat hunters track down the source of suspicious network connections. The custom dashboard presents which users and executables created connections between two given IPs, how many times they've connected, the protocols and ports used, and much more.
After Sysmon starts sending data to ElasticSearch, Kibana will be ready to go. Filter by a source and destination IP and a time range to view what connections have been made between the two. The Program List will display which executables on the source machine made the connections to the destination. The actual Sysmon logs are displayed lower on the screen where you can investigate the events in greater detail.
/var/lib/docker/volumes
has free space for the incoming network logs.Download the latest release tar file, extract it, and inside the BeaKer
directory,
run ./install_beaker.sh
on the Linux machine that will aggregate your Sysmon data and host Kibana.
The automated installer will:
/etc/BeaKer
elastic
accountsysmon-ingest
user password for connecting WinLogBeatsThe beaker
script installed to /usr/local/bin/beaker
is a wrapper around docker-compose
and can be used to manage BeaKer.
beaker down
beaker up
beaker logs -f elasticsearch
beaker logs -f kibana
After running ./install_beaker.sh
you should be able to access Kibana at localhost:5601
. Note that Kibana is exposed on every network interface available on the Docker host.
Use the elastic
account to perform your initial login to Kibana. Additional user accounts can be created using the Kibana interface. The sysmon-ingest
user account is not allowed to access Kibana.
The Elasticsearch server will begin listening for connections on port 9200 using HTTPS. It expects Sysmon ID 3 Network Events to be published to the ES index sysmon-%{+YYYY.MM.dd}
using the WinLogBeat schema. See the embedded winlogbeat.yml
file in ./agent/install-sysmon-beats.ps1
for more info.
The easiest way to begin sending data to the server is to use the automated BeaKer agent installer.
The PowerShell script ./agent/install-sysmon-beats.ps1
will install Sysmon and WinLogBeats, and configure WinLogBeats to begin sending data to the BeaKer server.
To install the agent, run the script as .\install-sysmon-beats.ps1 ip.or.hostname.of.beaker.server 9200
.
The script will then:
ESUsername
and ESPassword
sysmon-ingest
%PROGRAMFILES%
if it doesn't exist%PROGRAMFILES%
and %PROGRAMDATA%
if it doesn't existwinlogbeat.yml
)winlogbeat.yml
file to connect to the BeaKer serverAs an administrator, run the following scripts to uninstall the beaker agent:
C:\Program Files\Sysmon\Sysmon64.exe -u
To generate a new release tarball, run ./installer/generate_installer.sh
.
GNU GPL V3 © Active Countermeasures ™