Skip to content
This repository was archived by the owner on Apr 16, 2021. It is now read-only.
Doug Burks edited this page Apr 25, 2016 · 42 revisions
  • Developed by Paul Halliday:
    http://www.squertproject.org/

  • PHP web interface to Sguil database

  • Works best with Chromium/Chrome browser

  • Squert authenticates against the Sguil user database, so you should be able to login to Squert using the same username/password you use to login to Sguil

  • Gives you access to the following data types:

    • NIDS alerts
    • HIDS alerts
    • Asset data from PRADS (if PRADS and pads_agent are enabled)
    • HTTP logs from Bro (if http_agent is enabled)
  • The default view shows alerts from today. To show older alerts, click "INTERVAL", then click the 2 right arrows, set your custom date, and click Squert's refresh button (two circular arrows).

  • Can natively pivot to full packet capture transcripts for TCP traffic. To do this, click on the Event ID.

  • Can pivot to ELSA to query Bro logs. To do this, click an IP address, port, or signature, and then click ELSA. In Security Onion 14.04, Squert pivots to ELSA using a relative hyperlink, so it should use the same hostname or IP address that you used to connect to Squert. If you're still using Security Onion 12.04 and you need to change the IP address that Squert uses to pivot to ELSA, you can use the following code copied from /usr/bin/sosetup (replacing $IP with your actual IP address or hostname):

# Pivot from Squert to ELSA
URL="https://$IP:3154/?query_string=\"\${var}\"%20groupby:program"
HEXVAL=$(xxd -pu -c 256 <<< "$URL")
mysql -uroot -Dsecurityonion_db -e "INSERT IGNORE INTO filters (type,username,global,name,notes,alias,filter) VALUES ('url','','1','454C5341','','ELSA','$HEXVAL');"
Clone this wiki locally