As of 10/17/17 this version of the application is not deploying correctly, once the bugs are fixed we will post an update
The OAFE project was designed to assist with threat hunting and forensic investigations at remote locations. It is primarily a set of configurations and a bootstrap install script. With a limited amount of effort, the install script allows you to download a number of open source software projects onto one device. It also includes a number of ingest scripts for importing data into the data platform that is installed. This project does not distribute any software from other vendors, it simply facilitates downloads and configuration.
Hardware
- 16 GB RAM
- 250GB + HDD (SSD or RAID preferred)
- 4 Core processor
- 2 Network interface cards
Obtain an Ubuntu 16.04.2 LTS x64 Desktop USB install drive (or create one using Rufus (windows) and downloading the latest ISO from the Ubuntu website).
Boot to USB drive
- Install Ubuntu Desktop 16.04.02 LTS x64 with a default username of oafe. This is important unless you want to alter the script for a different user.
- Update and upgrade the software packages on your Ubuntu install.
- From a terminal window, install the following (you may want to update your profile preferences in terminal to not limit scrollback..this is helpful to troubleshoot). Edit -> Profile Preferences -> Scrolling -> Uncheck the box that says limit scrollback:
- In the terminal window you have opened, type
sudo apt-get install git nginx-full
and hit Enter. - Clone the OAFE repository. From a terminal:
git clone https://github.com/rebaker501/OAFE.git
- Change to the directory created during the git clone (cd OAFE most likely) and invoke the bootstrap. Type
sudo bash ./install_OAFE_16.04.sh -i -s -y
- The first time the script stops it will ask you to enter some information for the nginx ssl certificate. You can enter any information you would like in the certificate fields.
- When the script stops again, it will be prompting you for a password for the oafe user for nginx. This will allow access to the reverse proxied Kibana instance.
- The next time the script pauses is to install moloch, you should select whatever interface you'd like to use as the network monitoring interface, type no to install the demo elasticsearch server, when asked for the default elasticsearch location, make sure to type out http://localhost:9200 or the install will fail. Choose a password for the admin account for the Moloch web interface.
- When the script is complete, reboot.
- Once the newly built OAFE is back up an running, open a command prompt. CD to /opt/oafe/grr. From that directory run
sudo bash ./install_google_rapid_response.sh
- Tailor the GRR install for your needs.
- When the install is complete, add an oafe user for GRR. First run
sudo grr_config_updater add_user INSERTYOURUSERNAMEHERE
. - Add admin access by issuing the following
sudo grr_config_updater update_user oafe --add_labels admin,user
- Add Moloch user. From a terminal cd to /data/moloch/viewer. Issue the following command
sudo node addUser.js PICKAUSERNAME "ADMIN User" PICKAPASSWORD -admin
.
This is not production software by default. It will require some configuration to be utlized in production. This software is supplied "AS IS" without any warranties and support.
All parties involved in the development (currently Optum Technology and Rich Baker) assume no responsibility or liability for the use of the software, conveys no license or title under any patent, copyright, or mask work right to the product.
Optum Technology reserves the right to make changes in the software without notification. All parties involved in the development also make no representation or warranty that such application will be suitable for the specified use without further testing or modification.