<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>malicious traffic detection system Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/malicious-traffic-detection-system/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Tue, 28 Apr 2020 12:01:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>How To Install Maltrail Malicious Traffic Detection System on Linux</title>
		<link>https://www.osradar.com/how-to-install-maltrail-malicious-traffic-detection-system-on-linux/</link>
					<comments>https://www.osradar.com/how-to-install-maltrail-malicious-traffic-detection-system-on-linux/#respond</comments>
		
		<dc:creator><![CDATA[sabi]]></dc:creator>
		<pubDate>Tue, 28 Apr 2020 11:58:23 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[how to guide]]></category>
		<category><![CDATA[how to install malicious detection system on debian]]></category>
		<category><![CDATA[How To Install Maltrail Malicious Traffic Detection System on Linux]]></category>
		<category><![CDATA[malicious traffic detection system]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=19192</guid>

					<description><![CDATA[<p>In this article you will cover the installation of maltrail malicious traffic detection system on Linux. Maltrail uses the Traffic sensors in between the Servers and clients to detect the malicious URL&#8217;s or sources and monitor the traffic. So, let&#8217;s move towards the installation of Maltrail on Debian 10 Linux. Step 1: Update Your System [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-install-maltrail-malicious-traffic-detection-system-on-linux/">How To Install Maltrail Malicious Traffic Detection System on Linux</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In this article you will cover the <a href="https://www.osradar.com/?p=19192">installation of maltrail malicious traffic detection system</a> on Linux. Maltrail uses the Traffic sensors in between the Servers and clients to detect the malicious URL&#8217;s or sources and monitor the traffic. So, let&#8217;s move towards the installation of Maltrail on Debian 10 Linux.</p>



<h3><strong>Step 1: Update Your System</strong></h3>



<p>Run the below command to update and upgrade your system.</p>



<pre class="wp-block-verse">sudo apt update &amp;&amp; sudo apt upgrade</pre>



<h3><strong>Step 2: Install Maltrail Sensors &amp; Schedtool</strong></h3>



<p>As sensor will operate for tracking the traffic and monitor the malicious trails so install it by</p>



<pre class="wp-block-verse">sudo apt-get install schedtool</pre>



<p>This tool will help you in improving your CPU scheduling.</p>



<p>And hit the following command in your terminal to get the following packages from Maltrail Github page.</p>



<pre class="wp-block-verse">sudo apt-get install git python-pcapy -y</pre>



<p>Then clone the maltrail</p>



<pre class="wp-block-verse">git clone https://github.com/stamparm/maltrail.git</pre>



<p>Now, switch to the maltrail directory</p>



<pre class="wp-block-verse">cd maltrail</pre>



<p>Then run the below command to download the files.</p>



<pre class="wp-block-verse">sudo python sensor.py &amp;</pre>



<h3><strong>Step 3: Get Started with your Server</strong></h3>



<p>Server will provide the event happening informations &amp; the back end support. Here I&#8217;m going to set up the Server and the sensor on the same machine. You can do this by typing</p>



<pre class="wp-block-verse">[[ -d maltrail ]] || git clone https://github.com/stamparm/maltrail.git<br> cd maltrail<br> python server.py &amp;</pre>



<h3><strong>Step 4: Access Maltrail Dashboard</strong></h3>



<p>Open your browser and visit <strong>http://ip:8338</strong> to access the web dashboard of Maltrail.</p>



<p>By default the Username is <strong>admin</strong><br>And the password is <strong>changeme!</strong></p>



<p>So, provide these to login.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" width="1022" height="506" src="//1723336065.rsc.cdn77.org/wp-content/uploads/2020/04/maltrail-dashboard-1.png" alt="How To Install Maltrail Malicious Traffic Detection System on Linux" class="wp-image-19775" srcset="https://www.osradar.com/wp-content/uploads/2020/04/maltrail-dashboard-1.png 1022w, https://www.osradar.com/wp-content/uploads/2020/04/maltrail-dashboard-1-300x149.png 300w, https://www.osradar.com/wp-content/uploads/2020/04/maltrail-dashboard-1-768x380.png 768w, https://www.osradar.com/wp-content/uploads/2020/04/maltrail-dashboard-1-696x345.png 696w" sizes="(max-width: 1022px) 100vw, 1022px" /></figure></div>



<h3><strong>Step 4: Fine-tune Sensor &amp; Server configuration</strong></h3>



<p>If you want to fine tune the Maltrail Server and the sensor settings then you can do so by configuring the <strong>maltrail.conf</strong> file.</p>



<p>This file can be located where you&#8217;ve cloned the package. So, simply go to that folder and search for the <strong>maltrail.conf</strong> file.</p>



<pre class="wp-block-verse">sudo nano /home/tech/maltrail/maltrail.conf</pre>



<p>Here you can find the <strong>[Server] </strong>and <strong>[Sensor] </strong>categories inside the file so that you can edit them easily. In my case, I&#8217;m going to change the IP upon which Server is listening from (Default IP).</p>



<pre class="wp-block-verse">[Server]<br> Listen address of (reporting) HTTP server<br> HTTP_ADDRESS <strong>104.37.24.109</strong><br> HTTP_ADDRESS ::<br> HTTP_ADDRESS fe80::12c3:7bff:fe6d:cf9b%eno1<br> Listen port of (reporting) HTTP server<br> HTTP_PORT 8338<br> Use SSL/TLS<br> USE_SSL false<br> SSL/TLS (private/cert) PEM file (e.g. openssl req -new -x509 -keyout server.pem -out server.pem -days 1023 -nodes)<br> SSL_PEM misc/server.pem<br> User entries (username:sha256(password):UID:filter_netmask(s))<br> Note(s): sha256(password) can be generated on Linux with: echo -n 'password' | sha256sum | cut -d " " -f 1<br> UID &gt;= 1000 have only rights to display results (Note: this moment only functionality implemented at the client side)<br> filter_netmask(s) is/are used to filter results<br> USERS<br>      admin:9ab3cd9d67bf49d01f6a2e33d0bd9bc804ddbe6ce1ff5d219c42624851db5dbc:0:                        # changeme!      <br>  #local:9ab3cd9d67bf49d01f6a2e33d0bd9bc804ddbe6ce1ff5d219c42624851db5dbc:1000:192.168.0.0/16       # changeme!</pre>



<p>Now if you wish to change the Default credentials, simply search for the &#8220;<strong>USERS</strong>&#8221; section and you will see the admin details. Here you can change the pass by running the below command.</p>



<p>Note: Add the <strong>(:0)</strong> parameters at the end of the password.</p>



<pre class="wp-block-verse">echo -n 'StrongPassword' | sha256sum | cut -d " " -f 1<br> 05a181f00c157f70413d33701778a6ee7d2747ac18b9c0fbb8bd71a62dd7a223<br> The string produced represents StrongPassword as the password</pre>



<p>Now, again open the above file &amp; edit it to set up the new credentials you&#8217;ve applied.</p>



<pre class="wp-block-verse">[Server]<br> Listen address of (reporting) HTTP server<br> HTTP_ADDRESS  104.37.24.109 <br> HTTP_ADDRESS ::<br> HTTP_ADDRESS fe80::12c3:7bff:fe6d:cf9b%eno1<br> Listen port of (reporting) HTTP server<br> HTTP_PORT 8338<br> Use SSL/TLS<br> USE_SSL false<br> SSL/TLS (private/cert) PEM file (e.g. openssl req -new -x509 -keyout server.pem -out server.pem -days 1023 -nodes)<br> SSL_PEM misc/server.pem<br> User entries (username:sha256(password):UID:filter_netmask(s))<br> Note(s): sha256(password) can be generated on Linux with: echo -n 'password' | sha256sum | cut -d " " -f 1<br> UID &gt;= 1000 have only rights to display results (Note: this moment only functionality implemented at the client side)<br> filter_netmask(s) is/are used to filter results<br> filter_netmask(s) is/are used to filter results<br> USERS<br> admin:9ab3cd9d67bf49d01f6a2e33d0bd9bc804ddbe6ce1ff5d219c42624851db5dbc:0:                        # changeme!<br> local:9ab3cd9d67bf49d01f6a2e33d0bd9bc804ddbe6ce1ff5d219c42624851db5dbc:1000:192.168.0.0/16       # changeme!<br> Admin:05a181f00c157f70413d33701778a6ee7d2747ac18b9c0fbb8bd71a62dd7a223:0:  ## New credentials</pre>



<p>Then exit and restart the Maltrail.</p>



<pre class="wp-block-verse">cd /home/tech/maltrail<br> pkill -f server.py<br> python server.py &amp;</pre>



<h3><strong>Step 5: Testing the Maltrail</strong></h3>



<p>Run the below command to verify the testing of Maltrail.</p>



<pre class="wp-block-verse">ping -c 1 136.161.101.53<br>
cat /var/log/maltrail/$(date +"%Y-%m-%d").log</pre>



<p>For DNS traffic, simply run the below command</p>



<pre class="wp-block-verse">nslookup morphed.ru<br>cat /var/log/maltrail/$(date +"%Y-%m-%d").log</pre>



<p>Further, if you want to look up over the requests just refresh the page and you&#8217;ll get results like this.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" width="1024" height="205" src="//1723336065.rsc.cdn77.org/wp-content/uploads/2020/04/trails-2-1024x205.png" alt="" class="wp-image-19774" srcset="https://www.osradar.com/wp-content/uploads/2020/04/trails-2-1024x205.png 1024w, https://www.osradar.com/wp-content/uploads/2020/04/trails-2-300x60.png 300w, https://www.osradar.com/wp-content/uploads/2020/04/trails-2-768x154.png 768w, https://www.osradar.com/wp-content/uploads/2020/04/trails-2-696x139.png 696w, https://www.osradar.com/wp-content/uploads/2020/04/trails-2.png 1028w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure></div>



<p>So, this is how you can install Maltrail Traffic Detection System on Linux.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-install-maltrail-malicious-traffic-detection-system-on-linux/">How To Install Maltrail Malicious Traffic Detection System on Linux</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-to-install-maltrail-malicious-traffic-detection-system-on-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
