83e082e62a | ||
---|---|---|
bin | ||
configs | ||
doc | ||
docsphinx/source | ||
files | ||
logs | ||
var/www | ||
.dockerignore | ||
.gitignore | ||
.travis.yml | ||
Dockerfile | ||
HOWTO.md | ||
LICENSE | ||
OVERVIEW.md | ||
README.md | ||
docker_start.sh | ||
installing_deps.sh | ||
installing_deps_archlinux.sh | ||
mispKEYS.py.default | ||
pip_packages_requirement.txt | ||
reset_AIL.sh |
README.md
AIL
AIL framework - Framework for Analysis of Information Leaks
AIL is a modular framework to analyse potential information leaks from unstructured data sources like pastes from Pastebin or similar services or unstructured data streams. AIL framework is flexible and can be extended to support other functionalities to mine sensitive information.
Features
- Modular architecture to handle streams of unstructured or structured information
- Default support for external ZMQ feeds, such as provided by CIRCL or other providers
- Multiple feed support
- Each module can process and reprocess the information already processed by AIL
- Detecting and extracting URLs including their geographical location (e.g. IP address location)
- Extracting and validating potential leak of credit cards numbers, credentials, ...
- Extracting and validating email addresses leaked including DNS MX validation
- Module for extracting Tor .onion addresses (to be further processed for analysis)
- Keep tracks of duplicates
- Extracting and validating potential hostnames (e.g. to feed Passive DNS systems)
- A full-text indexer module to index unstructured information
- Statistics on modules and web
- Realtime modules manager in terminal
- Global sentiment analysis for each providers based on nltk vader module
- Terms, Set of terms and Regex tracking and occurrence
- Many more modules for extracting phone numbers, credentials and others
Installation
Type these command lines for a fully automated installation and start AIL framework
git clone https://github.com/CIRCL/AIL-framework.git
cd AIL-framework
./installing_deps.sh
cd var/www/
./update_thirdparty.sh
cd ~/AIL-framework/
. ./AILENV/bin/activate
cd bin/
./LAUNCH.sh
The default installing_deps.sh is for Debian and Ubuntu based distributions. For Arch linux based distributions, you can replace it with installing_deps_archlinux.sh.
There is also a Travis file used for automating the installation that can be used to build and install AIL on other systems.
Starting AIL web interface
To start the web interface, you first need to fetch the required Javascript/CSS files:
cd $AILENV
cd var/www/
bash update_thirdparty.sh
and then you can start the web interface python script:
cd $AILENV
cd var/www/
Flask_server.py
Eventually you can browse the status of the AIL framework website at the following URL:
``http://localhost:7000/``
HOWTO
HOWTO are available in HOWTO.md
Screenshots
Trending charts
Browsing
Sentiment analysis
Terms manager and occurence
Top terms
Command line module manager
License
Copyright (C) 2014 Jules Debra
Copyright (C) 2014-2016 CIRCL - Computer Incident Response Center Luxembourg (c/o smile, security made in Lëtzebuerg, Groupement d'Intérêt Economique)
Copyright (c) 2014-2016 Raphaël Vinot
Copyright (c) 2014-2016 Alexandre Dulaunoy
Copyright (c) 2016 Sami Mokaddem
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.