4.7 Implementing Host-based IDS Functionality Using Wazuh HIDS
4.7 Implementing Host-based IDS Functionality Using Wazuh HIDS
2 Hr 9 Min Remaining
Instructions Resources Help 100%
Exercise 7: Implementing Host-based IDS functionality using
Wazuh HIDS
Host Intrusion Detection is a requirement for today’s networks. Host-based Intrusion Detection Systems
(HIDS) detect the events on the server and generate alerts. Attacks and threats can be monitored easily
because the full communication stream can be inspected using HIDS.
Lab Scenario
Intrusion Detection Systems (IDS) help monitor network activity. HIDS enables a network defender to
monitor the network traffic for malicious activity or policy violations. Using Wazuh enables network
defenders to perform continuous monitoring and respond to advanced threats.
Lab Objectives
This lab will demonstrate the use of Wazuh HIDS and agent to capture network traffic and show how
to monitor the captured traffic for malicious activities. In this lab, you will learn:
Wazuh (OSSEC) is an open-source HIDS. The Wazuh agent runs at a host-level, combining anomaly
and signature-based technologies to detect intrusions or software misuse. It can also be used to
monitor user activities, assess system configuration, and detect vulnerabilities. Sguil is an open-
source interface for network security monitoring and event-driven analysis of IDS alerts (Snort and
Barnyard). It consists of an intuitive GUI for accessing real-time events, session data, and network
traffic capture.
Lab Tasks
36. This indicates that the attacker can extract the FTP username and password over the
network using insecure ports.
37. Switch to Admin Machine-2, login with password admin@123.
38. Launch the sguil application from the desktop.
39. The Sguil window appears. Type the username martin and password user@123.
Click the OK button.
40. Network interfaces will be displayed. Click the Select All button.
41. All available interfaces will be selected. Click the Start SGUIL button.
42. You will see the Sguil window as shown in the screenshot below.
43. The Windows Login Failure event is captured by the Wazuh agent.
44. You can observe the Dst IP 10.10.10.16 OSSEC alert.
45. Click on the OSSEC Windows: Logon Failure–unknown user record from the list
and check the Display Detail pane/option.
46. As described above, a network defender can use Wazuh to detect malicious activity
on the host machine.