Copying raw pcap from Security Onion 2.*.* to another system for processing #4038
-
Never considered this would be a problem in SO 2 since I used to copy raw pcap files from SO 16 and had no problem reading them in other tools like wireshark, but with the way stenographer stores the pcap in SO 2 it seems that this can not be accomplished anymore. So my question is how would I copy data from the /nsm/pcap onto another system where it can be read like normal pcap? I have seen some of the write ups talking about using the stenoread command and writing to a tmp file, but I want to copy all the pcap data on a server that is almost full and there is not space to write the pcap out again to copy off. Does anybody know a good quick and dirty script or command that will allow me to copy all the pcap SO 2 captured to another box or external storage and transform it to be read by all pcap tools? Thanks |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 4 replies
-
The solution my shop came up with was to copy all the steno (nsm/pcap and nsm/pcap index) files to a SAN. We then use a sensor joined to the grid (so it has the certs to read those steno files) to stenoread what we want based on timestamp and originating sensor name. This approach has the added benefit of being able to add parameters to what is being sent through stenoread, to get a .pcap file that’s focused on what specifically you are looking for. An alternate approach is to disable steno through the minion pillars, but this causes other issues. You might also consider piping the traffic to a secondary destination at the physical layer. I can provide more details if necessary. |
Beta Was this translation helpful? Give feedback.
-
Hi, I was wondering if you found a solution for this? I have nearly a terabyte of data I need to analyze. |
Beta Was this translation helpful? Give feedback.
-
Attached script answers the question |
Beta Was this translation helpful? Give feedback.
Attached script answers the question