2014-08-06 11:43:40 +02:00
AIL
===
AIL framework - Analysis Information Leak framework
AIL is a modular framework to analyse potential information leak from unstructured data source like pastes from Pastebin or similar services. AIL framework is flexible and can be extended to support other functionalities to mine sensitive information.
![Dashboard ](./doc/screenshots/DashboardAIL.png?raw=true "AIL framework dashboard" )
![Trending ](./doc/screenshots/WordtrendingAIL.png?raw=true "AIL framework wordtrending" )
Requirements & Installation
---------------------------
Obviously:
``sudo apt-get install python2.7``
But also pip, virtualenv and screen.
```
sudo apt-get install python-pip
sudo pip install virtualenv
sudo apt-get install screen
```
You need to create a variable AILENV that will be the installation path:
``export AILENV="/home/user/ail"``
Then create a Python virtual environment:
``virtualenv AILENV``
And install these few more packets:
```
sudo apt-get install g++
sudo apt-get install python-dev
sudo apt-get install python-tk
sudo apt-get install screen
2014-08-08 11:42:51 +02:00
sudo apt-get install libssl-dev
sudo apt-get install libfreetype6-dev
sudo apt-get install python-numpy
2014-08-06 11:43:40 +02:00
```
Then these modules need to be install with pip inside the virtual environment:
(Activating virtualenv)
```
. ./AILENV/bin/activate
```
You'll need to clone langid:
[https://github.com/saffsd/langid.py]
And install it:
```
python setup.py install
```
That's all the packages you can install with pip:
```
pip install redis
2014-08-08 11:42:51 +02:00
pip install logbook
2014-08-06 11:43:40 +02:00
pip install networkx
pip install crcmod
pip install mmh3
pip install dnspython
pip install pyzmq
2014-08-08 11:42:51 +02:00
pip install texttable
2014-08-06 11:43:40 +02:00
pip install -U textblob
python -m textblob.download_corpora
pip install python-magic
pip install numpy
2014-08-08 11:42:51 +02:00
pip install flask
2014-08-06 11:43:40 +02:00
pip install nltk
pip install matplotlib ----- (sudo ln -s freetype2/ft2build.h in /usr/include/)
pip install pybloomfiltermmap ----- (you may need to sudo apt-get install libssl-dev)
```
Installing Redis & Level DB
---------------------------
Assuming that you install everything under /opt/ with adequate permissions:
```
wget http://download.redis.io/releases/redis-2.8.12.tar.gz
tar -xvf redis-2.8.12.tar.gz -C /opt/
```
And follow the README after extraction.
When redis is properly installed you can edit your own config files for
the different required databases or just take the config from the project
located under ``/config/``
```
git clone https://github.com/KDr2/redis-leveldb.git
```
Follow the redis-leveldb README.
Then create these directories
```
cd $AILENV
mkdir PASTES
mkdir Blooms
mkdir dumps
mkdir LEVEL_DB_DATA
cd LEVEL_DB_DATA/
mkdir 2014
mkdir 2013
```
Starting AIL
------------
If you installed all the requirements described above, you should be able to start AIL framework:
```
cd $AILENV
cd bin
./LAUNCH.sh
```
2014-08-08 11:42:51 +02:00
To start with the web interface, you need to fetch the required Javascript/CSS files:
```
cd $AILENV
cd var/www/
bash update_thirdparty.sh
```
and then you can start the web interface:
```
cd $AILENV
cd var/www/
Flask_server.py
```
2014-08-06 11:43:40 +02:00
Then you can browse the status of the AIL framework at the following URL:
``http://localhost:7000/``
Create a new module
-------------------
Assuming you already download the project and configure everything:
* Redis databases [http://redis.io/]
* Redis Level DB [https://github.com/KDr2/redis-leveldb]
This module will be recover from a stream all the Tor .onion addresses:
"http://3g2upl4pq6kufc4m.onion/" Which look like this.
Basically we want to match all paste in with ``.onion`` addresses inside.
For that you can already use the module ``ZMQ_PubSub_Categ`` and just
create your own category file in: ``/file/`` here it will be ``/file/onion_categ``.
You need also to link this file inside another file (list_categ_files).
Inside the file "onion_categ", you will add the word "onion" (don't forget the carriage return).
Once it's done, at the launch of the AIL framework, every paste with the word onion inside them
will be forwarded on a specific channel (onion_categ).
Then what you want to do it's recovering these pastes to extract these .onion addresses.
To do that, you'll need to create 2 scripts:
``ZMQ_Sub_Onion_Q.py`` (Redis bufferizing)
``ZMQ_Sub_Onion.py`` (The extraction)
Those two files are there as an example.
Overview
--------
Here is a "chained tree" to show how all ZMQ Modules are linked and how the informations
(mainly the paste) is going through them.
The onion module is interfaced at top down level of this tree (like the ZMQ_Sub_Urls module).
All modules that you want to create using the "tokenization method" and the "categories system" need to be created at this level.
If you want to create a general module (e.g. using all pastes), this module need to be created at the same level than ZMQ_Sub_Duplicate.
![ZMQTree ](./doc/dia/ZMQ_Queuing_Tree.jpg?raw=true "ZMQ Tree" )
LICENSE
-------
```
Copyright (C) 2014 Jules Debra
Copyright (C) 2014 CIRCL - Computer Incident Response Center Luxembourg (℅ smile gie)
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see < http: / / www . gnu . org / licenses / > .
```