AIL-framework/README.md

194 lines
6.5 KiB
Markdown
Raw Normal View History

2016-01-19 14:17:16 +01:00
[![Build Status](https://travis-ci.org/CIRCL/AIL-framework.svg?branch=master)](https://travis-ci.org/CIRCL/AIL-framework)
AIL
===
2016-02-08 11:34:54 +01:00
![Logo](./doc/logo/logo-small.png?raw=true "AIL logo")
AIL framework - Framework for Analysis of Information Leaks
AIL is a modular framework to analyse potential information leaks from unstructured data sources like pastes from Pastebin or similar services or unstructured data streams. AIL framework is flexible and can be extended to support other functionalities to mine or process sensitive information.
2016-08-23 17:05:45 +02:00
![Dashboard](./doc/screenshots/dashboard.png?raw=true "AIL framework dashboard")
2016-08-23 17:20:22 +02:00
2016-02-08 11:49:33 +01:00
Features
--------
2016-02-08 14:13:24 +01:00
* Modular architecture to handle streams of unstructured or structured information
* Default support for external ZMQ feeds, such as provided by CIRCL or other providers
2017-05-03 14:25:58 +02:00
* Multiple feed support
2016-02-08 14:13:24 +01:00
* Each module can process and reprocess the information already processed by AIL
* Detecting and extracting URLs including their geographical location (e.g. IP address location)
2017-05-03 14:25:58 +02:00
* Extracting and validating potential leak of credit cards numbers, credentials, ...
2016-02-08 11:49:33 +01:00
* Extracting and validating email addresses leaked including DNS MX validation
* Module for extracting Tor .onion addresses (to be further processed for analysis)
2017-12-27 16:09:32 +01:00
* Keep tracks of duplicates (and diffing between each duplicate found)
2016-02-08 11:49:33 +01:00
* Extracting and validating potential hostnames (e.g. to feed Passive DNS systems)
* A full-text indexer module to index unstructured information
2017-05-03 14:25:58 +02:00
* Statistics on modules and web
* Real-time modules manager in terminal
2016-08-23 17:20:22 +02:00
* Global sentiment analysis for each providers based on nltk vader module
2017-05-03 14:25:58 +02:00
* Terms, Set of terms and Regex tracking and occurrence
2016-02-08 14:13:24 +01:00
* Many more modules for extracting phone numbers, credentials and others
* Alerting to [MISP](https://github.com/MISP/MISP) to share found leaks within a threat intelligence platform using [MISP standard](https://www.misp-project.org/objects.html#_ail_leak)
2018-05-11 16:25:50 +02:00
* Detect and decode Base64 and store files
* Detect Amazon AWS and Google API keys
2018-05-11 11:31:47 +02:00
* Detect Bitcoin address and Bitcoin private keys
2018-05-11 16:25:50 +02:00
* Detect private keys and certificate
2018-05-11 11:31:47 +02:00
Installation
------------
2017-10-22 18:49:11 +02:00
Type these command lines for a fully automated installation and start AIL framework:
2017-10-20 15:56:14 +02:00
```bash
2014-08-25 15:02:53 +02:00
git clone https://github.com/CIRCL/AIL-framework.git
cd AIL-framework
./installing_deps.sh
cd var/www/
./update_thirdparty.sh
cd ~/AIL-framework/
. ./AILENV/bin/activate
cd bin/
./LAUNCH.sh
```
2017-10-22 18:49:11 +02:00
2016-02-08 14:13:24 +01:00
The default [installing_deps.sh](./installing_deps.sh) is for Debian and Ubuntu based distributions. For Arch
linux based distributions, you can replace it with [installing_deps_archlinux.sh](./installing_deps_archlinux.sh).
2014-08-25 15:02:53 +02:00
2016-02-08 14:13:24 +01:00
There is also a [Travis file](.travis.yml) used for automating the installation that can be used to build and install AIL on other systems.
2018-05-09 13:32:25 +02:00
Python 3 Upgrade
------------
To upgrade from an existing AIL installation, you have to launch [python3_upgrade.sh](./python3_upgrade.sh), this script will delete and create a new virtual environment. The script **will upgrade the packages but won't keep your previous data** (neverthless the data is copied into a directory called `old`). If you install from scratch, you don't require to launch the [python3_upgrade.sh](./python3_upgrade.sh).
Docker Quick Start (Ubuntu 16.04 LTS)
------------
2017-10-22 18:49:11 +02:00
1. Install Docker
2017-10-20 15:56:14 +02:00
```bash
sudo su
apt-get install -y curl
curl https://get.docker.com | /bin/bash
```
2. Type these commands to build the Docker image:
2017-10-20 15:56:14 +02:00
```bash
git clone https://github.com/CIRCL/ail-framework
cd AIL-framework
2017-10-01 02:34:53 +02:00
docker build -t ail-framework .
```
3. To start AIL on port 7000, type the following command below:
```
docker run -p 7000:7000 ail-framework
```
4. To debug the running container, type the following command and note the container name or identifier:
2017-10-20 15:56:14 +02:00
```bash
docker ps
```
After getting the name or identifier type the following commands:
2017-10-20 15:56:14 +02:00
```bash
docker exec -it CONTAINER_NAME_OR_IDENTIFIER bash
cd /opt/ail
```
2016-08-23 17:20:22 +02:00
Install using Ansible
---------------------
Please check the [Ansible readme](ansible/README.md).
Starting AIL web interface
--------------------------
To start the web interface, you first need to fetch the required JavaScript/CSS files:
2014-08-08 11:42:51 +02:00
2017-10-20 15:56:14 +02:00
```bash
2014-08-08 11:42:51 +02:00
cd $AILENV
cd var/www/
bash update_thirdparty.sh
```
2016-02-08 14:13:24 +01:00
and then you can start the web interface python script:
2014-08-08 11:42:51 +02:00
2017-10-20 15:56:14 +02:00
```bash
2014-08-08 11:42:51 +02:00
cd $AILENV
cd var/www/
./Flask_server.py
2014-08-08 11:42:51 +02:00
```
2016-02-08 14:13:24 +01:00
Eventually you can browse the status of the AIL framework website at the following URL:
2017-10-20 15:56:14 +02:00
```
http://localhost:7000/
```
2017-07-17 13:36:41 +02:00
HOWTO
-----
HOWTO are available in [HOWTO.md](HOWTO.md)
2016-10-13 17:13:08 +02:00
2017-05-03 14:30:58 +02:00
Screenshots
===========
Trending charts
---------------
![Trending-Web](./doc/screenshots/trending-web.png?raw=true "AIL framework webtrending")
![Trending-Modules](./doc/screenshots/trending-module.png?raw=true "AIL framework modulestrending")
Browsing
--------
![Browse-Pastes](./doc/screenshots/browse-important.png?raw=true "AIL framework browseImportantPastes")
Sentiment analysis
------------------
![Sentiment](./doc/screenshots/sentiment.png?raw=true "AIL framework sentimentanalysis")
Terms manager and occurence
---------------------------
![Term-Manager](./doc/screenshots/terms-manager.png?raw=true "AIL framework termManager")
### Top terms
2017-05-03 14:30:58 +02:00
![Term-Top](./doc/screenshots/terms-top.png?raw=true "AIL framework termTop")
![Term-Plot](./doc/screenshots/terms-plot.png?raw=true "AIL framework termPlot")
[AIL framework screencast](https://www.youtube.com/watch?v=1_ZrZkRKmNo)
Command line module manager
---------------------------
![Module-Manager](./doc/screenshots/module-manager.png?raw=true "AIL framework ModuleInformationV2.py")
2017-05-03 14:30:58 +02:00
2017-05-03 14:25:58 +02:00
License
=======
```
Copyright (C) 2014 Jules Debra
2018-01-12 09:30:30 +01:00
Copyright (C) 2014-2018 CIRCL - Computer Incident Response Center Luxembourg (c/o smile, security made in Lëtzebuerg, Groupement d'Intérêt Economique)
Copyright (c) 2014-2018 Raphaël Vinot
Copyright (c) 2014-2018 Alexandre Dulaunoy
Copyright (c) 2016-2018 Sami Mokaddem
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
```