This isn’t a full walkthrough, it’s meant to be a quick and dirty quick-start.
If you already have ROCK installed and just need to understand getting test data in, skip to the end.
Do this to get started.
Select the right hypervisor you’re using.
12288 MB50.00 GB or more1228850.00 Gb or more4127.0.0.1, Host Port: 4443, Guest IP: 10.0.2.15, Guest Port: 443127.0.0.1, Host Port: 2222, Guest IP: 10.0.2.15, Guest Port: 22Now that we’ve prepped the hypervisors, let’s install ROCK.
c to continueecho 'dummy' | sudo tee -a /etc/modules-load.d/dummy.conf && sudo rebootsudo rock setup to launch the Text User Interface (TUI)Finally, let’s get data into ROCK.
Download some malicious pcap. I like to use Malware Traffic Analysis Example:
curl -OL [malware file.pcap.zip]
unzip [file.pcap.zip] (password: infected)
sudo tcpreplay -t -i [monitor interface] [file.pcap]
Note: the -t flag in tcpreplay will fire the traffic all at once and may overrun you network socket buffer and cause you to drop traffic. Remove the -t flag if you have this issue, but tcpreplay will run for as long as it took the pcap to be captured - so a 2 hour pcap will take 2 hours to replay.
In the home directory of the user you created during the installation, there is a file called KIBANA_CREDENTIALS.txt in your home directory (/home/your_username). In there you’ll find your username and passphrase.
Browse to https://ROCK_IP_ADDRESS and use the Kibana credentials to log in.
Pop over to the blog for pcap examples in ROCK.
If you run into issues, feel free to check out the ROCK documentation, the ROCK community page, or the ROCK Github page.