This isn’t a full walkthrough, it’s meant to be a quick and dirty quick-start.
If you already have ROCK installed and just need to understand getting test data in, skip to the end.
Do this to get started.
Select the right hypervisor you’re using.
12288
MB50.00
GB or more12288
50.00
Gb or more4
127.0.0.1
, Host Port: 4443
, Guest IP: 10.0.2.15
, Guest Port: 443
127.0.0.1
, Host Port: 2222
, Guest IP: 10.0.2.15
, Guest Port: 22
Now that we’ve prepped the hypervisors, let’s install ROCK.
c
to continueecho 'dummy' | sudo tee -a /etc/modules-load.d/dummy.conf && sudo reboot
sudo rock setup
to launch the Text User Interface (TUI)Finally, let’s get data into ROCK.
Download some malicious pcap. I like to use Malware Traffic Analysis Example:
curl -OL [malware file.pcap.zip]
unzip [file.pcap.zip] (password: infected)
sudo tcpreplay -t -i [monitor interface] [file.pcap]
Note: the -t
flag in tcpreplay
will fire the traffic all at once and may overrun you network socket buffer and cause you to drop traffic. Remove the -t
flag if you have this issue, but tcpreplay
will run for as long as it took the pcap to be captured - so a 2 hour pcap will take 2 hours to replay.
In the home directory of the user you created during the installation, there is a file called KIBANA_CREDENTIALS.txt
in your home directory (/home/your_username
). In there you’ll find your username and passphrase.
Browse to https://ROCK_IP_ADDRESS
and use the Kibana credentials to log in.
Pop over to the blog for pcap examples in ROCK.
If you run into issues, feel free to check out the ROCK documentation, the ROCK community page, or the ROCK Github page.