Merge branch 'master' of github.com:CIRCL/AIL-framework

pull/38/head
Raphaël Vinot 2014-12-22 15:32:48 +01:00
commit f717f9fe89
4 changed files with 87 additions and 28 deletions

View File

@ -1,19 +1,21 @@
AIL
===
AIL framework - Analysis Information Leak framework
AIL framework - Framework for Analysis of Information Leaks
AIL is a modular framework to analyse potential information leak from unstructured data source like pastes from Pastebin or similar services. AIL framework is flexible and can be extended to support other functionalities to mine sensitive information.
AIL is a modular framework to analyse potential information leaks from unstructured data sources like pastes from Pastebin or similar services. AIL framework is flexible and can be extended to support other functionalities to mine sensitive information.
![Dashboard](./doc/screenshots/DashboardAIL.png?raw=true "AIL framework dashboard")
![Trending](./doc/screenshots/WordtrendingAIL.png?raw=true "AIL framework wordtrending")
AIL framework screencast: https://www.youtube.com/watch?v=9idfHCIMzBY
Requirements & Installation
---------------------------
Auto installation
-----------------
Type these commands lines for a fully automated installation and start AIL-framework
Type these command lines for a fully automated installation and start AIL framework
```
git clone https://github.com/CIRCL/AIL-framework.git
cd AIL-framework
@ -28,10 +30,10 @@ cd bin/
Manual installation
-------------------
Obviously:
As AIL is based on python, obviously an installation of python is a requirement:
``sudo apt-get install python2.7``
But also pip, virtualenv and screen.
In addition pip, virtualenv and screen are needed:
```
sudo apt-get install python-pip
sudo pip install virtualenv
@ -80,7 +82,7 @@ And install it:
python setup.py install
```
That's all the packages you can install with pip:
These are all the packages you can install with pip:
```
pip install redis
@ -167,34 +169,33 @@ cd var/www/
Flask_server.py
```
Then you can browse the status of the AIL framework at the following URL:
Eventually you can browse the status of the AIL framework at the following URL:
``http://localhost:7000/``
Create a new module
-------------------
Assuming you already download the project and configure everything:
Assuming you already downloaded the project and configured everything:
* Redis databases [http://redis.io/]
* Redis Level DB [https://github.com/KDr2/redis-leveldb]
This module will be recover from a stream all the Tor .onion addresses:
"http://3g2upl4pq6kufc4m.onion/" Which look like this.
This module will recover from a streams all the Tor .onion addresses, which look like this:
"http://3g2upl4pq6kufc4m.onion/"
Basically we want to match all paste in with ``.onion`` addresses inside.
Basically we want to match all pastes in with ``.onion`` addresses inside.
For that you can already use the module ``ZMQ_PubSub_Categ`` and just
create your own category file in: ``/file/`` here it will be ``/file/onion_categ``.
You need also to link this file inside another file (list_categ_files).
You also need to link this file inside another file (list_categ_files).
Inside the file "onion_categ", you will add the word "onion" (don't forget the carriage return).
Once it's done, at the launch of the AIL framework, every paste with the word onion inside them
will be forwarded on a specific channel (onion_categ).
Once it's done, after the launch of AIL framework, every paste with the word onion inside will be forwarded on a specific channel (onion_categ).
Then what you want to do it's recovering these pastes to extract these .onion addresses.
Then what you want to do is to identify these pastes to extract the .onion addresses.
To do that, you'll need to create 2 scripts:
``ZMQ_Sub_Onion_Q.py`` (Redis bufferizing)
@ -205,14 +206,14 @@ Those two files are there as an example.
Overview
--------
Here is a "chained tree" to show how all ZMQ Modules are linked and how the informations
(mainly the paste) is going through them.
Here is a "chained tree" to show how all ZMQ Modules that are linked and how the information
(mainly the paste) is flowing between them.
The onion module is interfaced at top down level of this tree (like the ZMQ_Sub_Urls module).
All modules that you want to create using the "tokenization method" and the "categories system" need to be created at this level.
If you want to create a general module (e.g. using all pastes), this module need to be created at the same level than ZMQ_Sub_Duplicate.
If you want to create a general module (e.g. using all pastes), this module needs to be created at the same level than ZMQ_Sub_Duplicate.
![ZMQTree](./doc/dia/ZMQ_Queuing_Tree.jpg?raw=true "ZMQ Tree")
@ -230,7 +231,9 @@ LICENSE
```
Copyright (C) 2014 Jules Debra
Copyright (C) 2014 CIRCL - Computer Incident Response Center Luxembourg (℅ smile gie)
Copyright (C) 2014 CIRCL - Computer Incident Response Center Luxembourg (c/o smile, security made in Lëtzebuerg, Groupement d'Intérêt Economique)
Copyright (c) 2014 Raphaël Vinot
Copyright (c) 2014 Alexandre Dulaunoy
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published by

View File

@ -0,0 +1,50 @@
#!/usr/bin/env python
# -*- coding: utf-8 -*-
#
# This file is part of AIL framework - Analysis Information Leak framework
#
# This a simple feeder script feeding data from pystemon to AIL.
#
# Don't forget to set your pystemonpath and ensure that the
# configuration matches this script. Default is Redis DB 10.
#
# https://github.com/cvandeplas/pystemon/blob/master/pystemon.yaml#L16
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU Affero General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Copyright (c) 2014 Alexandre Dulaunoy - a@foo.be
import zmq
import random
import sys
import time
import redis
import base64
port = "5556"
pystemonpath = "/home/pystemon/pystemon/"
context = zmq.Context()
socket = context.socket(zmq.PUB)
socket.bind("tcp://*:%s" % port)
# check https://github.com/cvandeplas/pystemon/blob/master/pystemon.yaml#L16
r = redis.StrictRedis(host='localhost', db=10)
# 101 pastes processed feed
# 102 raw pastes feed
while True:
time.sleep(1)
topic = 101
paste = r.lpop("pastes")
if paste is None:
continue
socket.send("%d %s" % (topic, paste))
topic = 102
messagedata = open(pystemonpath+paste).read()
socket.send("%d %s %s" % (topic, paste, base64.b64encode(messagedata)))

View File

@ -31,8 +31,12 @@ host = localhost
port = 2013
db = 1
[Url]
cc_critical = DE
# PUB / SUB : ZMQ
[Feed]
# if you use the pystemon-feeder.py change the configuration
# where the feeder is listening. Usually it's 127.0.0.1:5556
adress = tcp://crf.circl.lu:5556
topicfilter = 102
[DomClassifier]
cc = DE
@ -53,11 +57,11 @@ channel = 102
address = tcp://127.0.0.1:5004
channel = urls
[ZMQ_FetchedOnion]
address = tcp://127.0.0.1:5005
channel = FetchedOnion
[PubSub_DomainClassifier]
cc = DE
cc_tld = r'\.de$'
[RedisPubSub]
host = localhost
port = 6381
db = 0
# Indexer configuration
[Indexer]
type = whoosh
path = indexdir

View File

@ -26,6 +26,8 @@ ipython
flask
texttable
#DomainClassifier
DomainClassifier
#Indexer requirements
whoosh