Skip to content

Instantly share code, notes, and snippets.

View da667's full-sized avatar

da_667 da667

  • Triptych Security
  • Somewhere in the ether
View GitHub Profile
@da667
da667 / rule-updater
Created March 27, 2025 17:17
runs suricata-update, and provides ETOPEN rules to /opt/dalton/rulesets/suricata, and renames the .rules file to make it more descriptive
#!/usr/bin/env bash
#rule updater script
#runs suricata-update, drops a rule file in
#/opt/dalton/rulesets/suricata
#Then renames the rule file to reflect
#that it's the full ETOPEN ruleset, the date the
#rules were updated, and that its suricata 7.0.3
#drop this file into /etc/cron.daily|weekly|monthly
#as desired, and run chmod u+x rule-updater
#or cron (or the systemd equivlent) won't run it.
@da667
da667 / docker-compose.yml
Last active March 21, 2025 18:52
Streamlined docker-compose.yml for Dalton
---
services:
controller:
build:
context: .
dockerfile: Dockerfile-dalton
args:
- http_proxy=${http_proxy}
- https_proxy=${https_proxy}
@da667
da667 / updater
Created May 6, 2024 16:04
snort3 updater script
#!/bin/bash
#updater.sh - Weekly update script
#checks for updates, downloads them, then reboots the system.
#place this script in /etc/cron.weekly, ensure it is owned by root (chown root:root /etc/cron.weekly/updater)
#ensure the script has execute permissions (chmod 700 /etc/cron.weekly/updater)
#if you want updates to run once daily or monthly, you could also place this script into cron.daily, or cron.weekly.
#alternatively, edit /etc/crontab to create a crontab entry.
export DEBIAN_FRONTEND=noninteractive
apt-get -q update
@da667
da667 / snort3.service
Last active May 7, 2024 20:51
snort3 service file
[Unit]
Description=Snort Daemon
After=syslog.target network.target
[Service]
Type=simple
ProtectHome=true
ProtectKernelTunables=true
ProtectKernelModules=true
ProtectControlGroups=true
@da667
da667 / custom.lua
Created April 28, 2024 21:19
snort3 - custom.lua
--These configuration lines will perform the following tasks:
--enables the built-in preproc rules, and snort.rules file
--enables hyperscan as the search engine for pattern matching
--enables the IP reputation blocklist
--enables JSON alerting for snort alerts
--enables appid, the appid listener, and logging appid events.
ips =
{
enable_builtin_rules = true,
@da667
da667 / pulledpork.conf
Created April 28, 2024 19:47
pulledpork3 - Trimmed down pulledpork.conf
LightSPD_ruleset = true
oinkcode = [your oinkcode here]
snort_blocklist = true
et_blocklist = true
blocklist_path = /usr/local/etc/lists/default.blocklist
pid_path = /var/log/snort/snort.pid
ips_policy = security
rule_mode = simple
rule_path = /usr/local/etc/rules/snort.rules
local_rules = /usr/local/etc/rules/local.rules
@da667
da667 / config
Last active August 13, 2021 17:29
SSH config file for Chapter 15: Routing and Remote Access for Bare-Metal hypervisors: Contains root user connection profiles
Host siem
Hostname 172.16.1.3
User ayy
Host siemroot
Hostname 172.16.1.3
User root
Host ips
HostName 172.16.1.4
@da667
da667 / config
Last active August 13, 2021 17:11
SSH config file for Chapter 16: Routing and Remote Access for Bare-Metal hypervisors: Contains root user connection profiles
Host bastion_host
Hostname 10.0.0.162
User ayy
LocalForward 9000 172.16.1.3:22
LocalForward 9001 172.16.1.4:22
LocalForward 9002 172.16.2.2:22
DynamicForward 9003
Host bastion_host_root
Hostname 10.0.0.162
@da667
da667 / config
Last active August 13, 2021 17:45
SSH config file for Building Virtual Machine Labs Chapter 16: Routing and Remote Access for Bare-Metal Hypervisors
Host bastion_host
Hostname 10.0.0.163
User ayy
LocalFoward 9000 172.16.1.3:22
LocalFoward 9001 172.16.1.4:22
LocalFoward 9002 172.16.2.2:22
DynamicFoward 9003
Host siem
Hostname 127.0.0.1
@da667
da667 / config
Last active August 13, 2021 17:30
SSH config file for Building Virtual Machine Labs Chapter 15: Routing and Remote Access for Hosted Hypervisors
Host siem
Hostname 172.16.1.3
User ayy
Host ips
HostName 172.16.1.4
User ayy
Host kali
HostName 172.16.2.2