Skip to content

ijaz-ahmad11/wazuh-deployment

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Wazuh Deployment Project

This project demonstrates the deployment and configuration of Wazuh as a Security Information and Event Management (SIEM) system and Host-based Intrusion Detection System (HIDS). It includes config files, automation scripts, alert samples, and dashboard screenshots for reference and reproducibility.


Features

  • Wazuh Manager & Agent setup (on Linux)
  • Custom alert rules and log collection
  • Sample integration with Suricata and Cowrie
  • Kibana/OpenSearch dashboard visualizations
  • Auto-installation script for quick deployment

Project Structure

  • configuration/ – Wazuh Manager and Agent configuration files
  • alerts/ – Sample alerts captured during malware and rule testing
  • screenshot/ – Dashboards and alert views for visibility
  • scripts/ – Automated installation and setup scripts
  • wazuh-installation-guide.md – Step-by-step deployment instructions

Screenshots

A collection of real-world detections and monitoring events using Wazuh:


Blocking Malicious IPs

Wazuh blocks known malicious IP addresses to prevent external attacks. Blocking Malicious IPs


Detecting Brute Force Attack

Monitors multiple failed login attempts and triggers alerts. Brute Force Detection


Detecting Hidden Processes

Reveals stealthy or hidden processes trying to evade detection. Hidden Process Detection


Malware Detection via VirusTotal

Wazuh integrates with VirusTotal to verify suspicious files. Malware Detection


Shellshock Exploit Detection

Detects attempts to exploit Bash vulnerabilities like Shellshock. Shellshock Detection


Unauthorized Process Execution

Alerts on the execution of non-whitelisted or suspicious processes. Unauthorized Processes


File Integrity Monitoring

Detects unauthorized changes to critical system files. FIM


Monitoring Malicious Command Execution

Tracks execution of known malicious or suspicious commands. Malicious Commands


Docker Event Monitoring

Observes security-relevant Docker events. Docker Monitoring


SQL Injection Attack Detection

Alerts on patterns related to SQL injection attempts. SQL Injection


Vulnerability Detection

Detects known software vulnerabilities based on CVEs. Vulnerability Detection


Getting Started

git clone https://github.com/your-username/wazuh-deployment.git
cd wazuh-deployment
bash scripts/install_wazuh.sh

License

This project is licensed under the MIT License. You are free to use, modify, and distribute it with attribution.


Author

Ijaz Ahmad Cybersecurity Engineer | Blue Team Specialist 📧 Email: [email protected] 🌐 [LinkedIn Profile] https://linkedin.com/in/ijaz-ahmad-afridi