From c27dfc035a0090eb594fcb044800cdf8e6068957 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Thirion=20Aur=C3=A9lien?= Date: Fri, 24 May 2019 13:32:50 +0200 Subject: [PATCH 1/2] Update README.md --- README.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 1b6eab35..9f9d8d4d 100644 --- a/README.md +++ b/README.md @@ -62,11 +62,12 @@ Features * Create events on [MISP](https://github.com/MISP/MISP) and cases on [The Hive](https://github.com/TheHive-Project/TheHive) * Automatic paste export at detection on [MISP](https://github.com/MISP/MISP) (events) and [The Hive](https://github.com/TheHive-Project/TheHive) (alerts) on selected tags * Extracted and decoded files can be searched by date range, type of file (mime-type) and encoding discovered -* Graph relationships between decoded file (hashes) +* Graph relationships between decoded file (hashes), similar PGP UIDs and addresses of cryptocurrencies * Tor hidden services crawler to crawl and parse output * Tor onion availability is monitored to detect up and down of hidden services * Browser hidden services are screenshot and integrated in the analysed output including a blurring screenshot interface (to avoid "burning the eyes" of the security analysis with specific content) * Tor hidden services is part of the standard framework, all the AIL modules are available to the crawled hidden services +* Generic web crawler to trigger crawling on demand or at regular interval URL or Tor hidden services Installation From fae3530fec149ad2e97f472e7b94924702d69916 Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Fri, 24 May 2019 14:10:06 +0200 Subject: [PATCH 2/2] chg: [PgpDump] PMF fix - longer keys are truncated TODO: Need to be updated by an async process handling the keys --- bin/PgpDump.py | 3 +++ 1 file changed, 3 insertions(+) diff --git a/bin/PgpDump.py b/bin/PgpDump.py index b982b9c5..0dc43621 100755 --- a/bin/PgpDump.py +++ b/bin/PgpDump.py @@ -59,6 +59,9 @@ def extract_all_id(item_content, regex): def get_pgp_packet(save_path): save_path = '{}'.format(save_path) + print (len(save_path)) + if len(save_path) > 131072: + save_path = save_path[:131071] process1 = subprocess.Popen([ 'echo', '-e', save_path], stdout=subprocess.PIPE) process2 = subprocess.Popen([ 'pgpdump'], stdin=process1.stdout, stdout=subprocess.PIPE) process1.stdout.close()