From the course: Complete Guide to Open Source Security

Unlock the full course today

Join today to access over 24,500 courses taught by industry experts.

Understanding Malcolm for threat hunting

Understanding Malcolm for threat hunting

From the course: Complete Guide to Open Source Security

Understanding Malcolm for threat hunting

- [Instructor] As part of the release of Kali Purple, the Malcolm tool, developed by the Idaho Labs for the US Department of Homeland Security, has been forwarded into a Kali Purple-friendly form. This tool provides an integrated set of tools for traffic analysis to support threat hunting. It consists of the Suricata IDS, the Zeek Session Analysis tool, and the Arkime Deep Packet Inspection tool, all feeding into an OpenSearch database. The pipeline diagram shows the main components of the Malcolm system. While it can run live, we'll be using Malcolm in its offline form, where it consumes a PCAP for file analysis. When we import the PCAP file into Malcolm, it's automatically analyzed by Suricata, and can optionally be analyzed by either or both of the Arkime Deep Packet capture tool and the Zeek Session Analysis tool. The packets are stored directly in OpenSearch, and the results of the Zeek and Suricata analysis are stored in Logstash for ingestion by OpenSearch, The Arkime viewer…

Contents