Recently I have come across a situation where I need to install Sysmon on a Linux virtual machine in Azure subscription and analyze those logs in Log analytics workspace. This post is a quick guide to help installing Sysmon and analyzing logs using Kusto query language. Prerequisites to install Sysmon for Linux Ensure the Linux virtual machine is on boarded to Log analytics workspace. Collect Syslog events with Azure Monitor Agent. Install using this Installing Sysmon on Linux For complete installation process on various .nix operating systems, follow Sysmon installation instructions here Ubuntu 20.04 & 22.04 Register Microsoft key and feed wget -q https://packages.microsoft.com/config/ubuntu/$(lsb_release -rs)/packages-microsoft-prod.deb -O packages-microsoft-prod.deb sudo dpkg -i packages-microsoft-prod.deb Install SysmonForLinux sudo apt-get update sudo apt-get install sysmonforlinux The Kusto query to parse the Sysmon logs on a Linux can be found here. let Eventlogs =
INTRODUCTION This post walks you through the log analysis of OMIGod vulnerability exploitation artefacts using kusto query language (KQL). The raw json logs from exploited linux device are fetched into Azure KQL data explorer using externaldata() function and analysed in KQL instance. I have been learning Kusto Query Language as part of my routine and KQL experts can write better queries to fine tune json data than what I have mentioned here The Linux device with vulnerable OMI version is configured with Linux Audit Daemon with the best practice configuration This blog explains about setting up your own private pwn lab for OMI exploitation This great Linux Logging with AuditD video by IppSec explains how to set up linux logging with Auditd. Below are all the comments by IppSec from the video (no comments from me and full credit goest to IppSec) Installing Auditd Downloading a good baseline ruleset from github Going over the baseline file to understand how logging works What th