Analysis Information Leak framework
 
 
 
 
 
Go to file
Philipp Schmied b6fcf51309 Flask_terms.py: Fixed mapping of notifcation e-mails to terms with uppercase letters 2018-02-28 09:19:27 +01:00
bin config.cfg.sample: Merged overwritten changes from upstream 2018-02-27 16:16:57 +01:00
configs
doc updated: slides 2017-11-28 08:30:31 +01:00
docsphinx/source
files
logs
var/www Flask_terms.py: Fixed mapping of notifcation e-mails to terms with uppercase letters 2018-02-28 09:19:27 +01:00
.dockerignore
.gitignore Deleted data-flow graph and header.html from the index + Added fixed typo where 10min was in fact 3min 2017-08-21 10:51:56 +02:00
.travis.yml
Dockerfile Updated Dockerfile 2017-10-01 02:29:56 +02:00
HOWTO.md Added ore info on new webpage creation 2017-07-17 13:26:10 +02:00
LICENSE
OVERVIEW.md
README.md README.md: Add note 2018-02-27 14:44:22 +01:00
docker_start.sh
installing_deps.sh fix: correct package names and more privilege for installing tlsh 2018-02-23 09:27:40 +01:00
installing_deps_archlinux.sh
mispKEYS.py.default Added draft support of MISP ail-leak object 2017-11-16 09:52:37 +01:00
pip3_packages_requirement.txt fix: correct package names and more privilege for installing tlsh 2018-02-23 09:27:40 +01:00
pip_packages_requirement.txt Restored adns dependency 2017-08-21 13:23:29 +02:00
reset_AIL.sh Added AIL reset script 2017-08-23 15:05:51 +02:00

README.md

AIL

Logo

This is a development fork. The original repository can be found here

AIL framework - Framework for Analysis of Information Leaks

AIL is a modular framework to analyse potential information leaks from unstructured data sources like pastes from Pastebin or similar services or unstructured data streams. AIL framework is flexible and can be extended to support other functionalities to mine or process sensitive information.

Dashboard

Features

  • Modular architecture to handle streams of unstructured or structured information
  • Default support for external ZMQ feeds, such as provided by CIRCL or other providers
  • Multiple feed support
  • Each module can process and reprocess the information already processed by AIL
  • Detecting and extracting URLs including their geographical location (e.g. IP address location)
  • Extracting and validating potential leak of credit cards numbers, credentials, ...
  • Extracting and validating email addresses leaked including DNS MX validation
  • Module for extracting Tor .onion addresses (to be further processed for analysis)
  • Keep tracks of duplicates (and diffing between each duplicate found)
  • Extracting and validating potential hostnames (e.g. to feed Passive DNS systems)
  • A full-text indexer module to index unstructured information
  • Statistics on modules and web
  • Real-time modules manager in terminal
  • Global sentiment analysis for each providers based on nltk vader module
  • Terms, Set of terms and Regex tracking and occurrence
  • Many more modules for extracting phone numbers, credentials and others
  • Alerting to MISP to share found leaks within a threat intelligence platform using MISP standard

Installation

Type these command lines for a fully automated installation and start AIL framework:

git clone https://github.com/CIRCL/AIL-framework.git
cd AIL-framework
./installing_deps.sh
cd var/www/
./update_thirdparty.sh
cd ~/AIL-framework/
. ./AILENV/bin/activate
cd bin/
./LAUNCH.sh

The default installing_deps.sh is for Debian and Ubuntu based distributions. For Arch linux based distributions, you can replace it with installing_deps_archlinux.sh.

There is also a Travis file used for automating the installation that can be used to build and install AIL on other systems.

Docker Quick Start (Ubuntu 16.04 LTS)

  1. Install Docker
sudo su
apt-get install -y curl
curl https://get.docker.com | /bin/bash
  1. Type these commands to build the Docker image:
git clone https://github.com/CIRCL/ail-framework
cd AIL-framework
docker build -t ail-framework .
  1. To start AIL on port 7000, type the following command below:
docker run -p 7000:7000 ail-framework
  1. To debug the running container, type the following command and note the container name or identifier:
docker ps

After getting the name or identifier type the following commands:

docker exec -it CONTAINER_NAME_OR_IDENTIFIER bash
cd /opt/ail

Starting AIL web interface

To start the web interface, you first need to fetch the required JavaScript/CSS files:

cd $AILENV
cd var/www/
bash update_thirdparty.sh

and then you can start the web interface python script:

cd $AILENV
cd var/www/
Flask_server.py

Eventually you can browse the status of the AIL framework website at the following URL:

http://localhost:7000/

HOWTO

HOWTO are available in HOWTO.md

Screenshots

Trending-Web Trending-Modules

Browsing

Browse-Pastes

Sentiment analysis

Sentiment

Terms manager and occurence

Term-Manager

Top terms

Term-Top Term-Plot

AIL framework screencast

Command line module manager

Module-Manager

License

    Copyright (C) 2014 Jules Debra
    Copyright (C) 2014-2018 CIRCL - Computer Incident Response Center Luxembourg (c/o smile, security made in Lëtzebuerg, Groupement d'Intérêt Economique)
    Copyright (c) 2014-2018 Raphaël Vinot
    Copyright (c) 2014-2018 Alexandre Dulaunoy
    Copyright (c) 2016-2018 Sami Mokaddem

    This program is free software: you can redistribute it and/or modify
    it under the terms of the GNU Affero General Public License as published by
    the Free Software Foundation, either version 3 of the License, or
    (at your option) any later version.

    This program is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU Affero General Public License for more details.

    You should have received a copy of the GNU Affero General Public License
    along with this program.  If not, see <http://www.gnu.org/licenses/>.