相伴江湖 -- Be With You

2020年8月27日星期四

Rastrea2R - Collecting & Hunting For IOCs With Gusto And Style



Ever wanted to turn your AV console into an Incident Response & Threat Hunting machine? Rastrea2r (pronounced "rastreador" - hunter- in Spanish) is a multi-platform open source tool that allows incident responders and SOC analysts to triage suspect systems and hunt for Indicators of Compromise (IOCs) across thousands of endpoints in minutes. To parse and collect artifacts of interest from remote systems (including memory dumps), rastrea2r can execute sysinternal, system commands and other 3rd party tools across multiples endpoints, saving the output to a centralized share for automated or manual analysis. By using a client/server RESTful API, rastrea2r can also hunt for IOCs on disk and memory across multiple systems using YARA rules. As a command line tool, rastrea2r can be easily integrated within McAfee ePO, as well as other AV consoles and orchestration tools, allowing incident responders and SOC analysts to collect forensic evidence and hunt for IOCs without the need for an additional agent, with 'gusto' and style!


Dependencies
  • Python 2.7.x
  • git
  • bottle
  • requests
  • yara-python

Quickstart
  • Clone the project to your local directory (or download the zip file of the project)
$git clone https://github.com/rastrea2r/rastrea2r.git
$cd rastrea2r
  • All the dependencies necessary for the tool to run can be installed within a virtual environment via the provided makefile.
$make help
help - display this makefile's help information
venv - create a virtual environment for development
clean - clean all files using .gitignore rules
scrub - clean all files, even untracked files
test - run tests
test-verbose - run tests [verbosely]
check-coverage - perform test coverage checks
check-style - perform pep8 check
fix-style - perform check with autopep8 fixes
docs - generate project documentation
check-docs - quick check docs consistency
serve-docs - serve project html documentation
dist - create a wheel distribution package
dist-test - test a wheel distribution package
dist-upload - upload a wheel distribution package
  • Create a virtual environment with all dependencies
$make venv
//Upon successful creation of the virtualenvironment, enter the virtualenvironment as instructed, for ex:
$source /Users/ssbhat/.venvs/rastrea2r/bin/activate
  • Start the rastrea2r server by going to $PROJECT_HOME/src/rastrea2r/server folder
$cd src/rastrea2r/server/
$python rastrea2r_server_v0.3.py
Bottle v0.12.13 server starting up (using WSGIRefServer())...
Listening on http://0.0.0.0:8080/
  • Now execute the client program, depending on which platform you are trying to scan choose the target python script appropriately. Currently Windows, Linux and Mac platforms are supported.
$python rastrea2r_osx_v0.3.py -h
usage: rastrea2r_osx_v0.3.py [-h] [-v] {yara-disk,yara-mem,triage} ...

Rastrea2r RESTful remote Yara/Triage tool for Incident Responders

positional arguments: {yara-disk,yara-mem,triage}

modes of operation
yara-disk Yara scan for file/directory objects on disk
yara-mem Yara scan for running processes in memory
triage Collect triage information from endpoint

optional arguments:
-h, --help show this help message and exit
-v, --version show program's version number and exit


Further more, the available options under each command can be viewed by executing the help option. i,e

$python rastrea2r_osx_v0.3.py yara-disk -h
usage: rastrea2r_osx_v0.3.py yara-disk [-h] [-s] path server rule

positional arguments:
path File or directory path to scan
server rastrea2r REST server
rule Yara rule on REST server

optional arguments:
-h, --help show this help message and exit
-s, --silent Suppresses standard output
  • For ex, on a Mac or Unix system you would do:
$cd src/rastrea2r/osx/

$python rastrea2r_osx_v0.3.py yara-disk /opt http://127.0.0.1:8080/ test.yar

Executing rastrea2r on Windows

Currently Supported functionality
  • yara-disk: Yara scan for file/directory objects on disk
  • yara-mem: Yara scan for running processes in memory
  • memdump: Acquires a memory dump from the endpoint ** Windows only
  • triage: Collects triage information from the endpoint ** Windows only

Notes
For memdump and triage modules, SMB shares must be set up in this specific way:
  • Binaries (sysinternals, batch files and others) must be located in a shared folder called TOOLS (read only)
    \path-to-share-foldertools
  • Output is sent to a shared folder called DATA (write only)
    \path-to-share-folderdata
  • For yara-mem and yara-disk scans, the yara rules must be in the same directory where the server is executed from.
  • The RESTful API server stores data received in a file called results.txt in the same directory.

Contributing to rastrea2r project
The Developer Documentation provides complete information on how to contribute to rastrea2r project

Demo videos on Youtube

Presentations

Credits & References



More info


  1. Hack Tool Apk No Root
  2. Hacker Tools For Ios
  3. Pentest Tools Website
  4. What Are Hacking Tools
  5. Hacking Tools Download
  6. Hacking Tools Hardware
  7. Hack Tools Mac
  8. Pentest Reporting Tools
  9. Pentest Tools Open Source
  10. Ethical Hacker Tools
  11. World No 1 Hacker Software
  12. Pentest Tools Apk
  13. Hack Tools For Mac
  14. Pentest Tools Kali Linux
  15. Hacker Tool Kit
  16. Easy Hack Tools
  17. Nsa Hacker Tools
  18. Hack Tools Download
  19. Hacking Tools Download
  20. Hacking Tools Pc
  21. Kik Hack Tools
  22. Hacker Tools
  23. Pentest Tools For Windows
  24. Tools 4 Hack
  25. Pentest Tools For Windows
  26. Hack Tools Pc
  27. Hacker Tools Apk Download
  28. Hacker Tools 2019
  29. Hack And Tools
  30. Hack Tools For Pc
  31. Hacking Tools Github
  32. Pentest Tools For Mac
  33. Hacking Tools Software
  34. Free Pentest Tools For Windows
  35. Hacking Tools For Windows
  36. Pentest Tools Download
  37. Hacker Tools 2020
  38. Hacker Tools Hardware
  39. Hack Tools For Ubuntu
  40. Computer Hacker
  41. Ethical Hacker Tools
  42. Pentest Tools For Mac
  43. Hacker Tools Apk
  44. Beginner Hacker Tools
  45. Hacking Tools For Kali Linux
  46. Hacker Tools Free
  47. Hacking App
  48. Hacking Tools For Windows 7
  49. Hacking Tools Pc
  50. How To Hack
  51. Hack Tools For Ubuntu
  52. Hacking Tools Online
  53. Pentest Tools Website Vulnerability
  54. Best Hacking Tools 2020
  55. Github Hacking Tools
  56. Hacking Tools For Pc
  57. Pentest Tools For Ubuntu
  58. How To Hack
  59. Pentest Tools Nmap
  60. Hacking Tools Windows
  61. Blackhat Hacker Tools
  62. Pentest Tools Find Subdomains
  63. Pentest Tools Website
  64. Hacking Tools Github
  65. Pentest Tools Alternative
  66. Physical Pentest Tools
  67. Hacker Techniques Tools And Incident Handling
  68. Hacking Tools For Windows 7
  69. Pentest Tools Tcp Port Scanner
  70. Termux Hacking Tools 2019
  71. Hack Tools Github
  72. Hack App
  73. Hacker Tools For Ios
  74. Pentest Box Tools Download
  75. Hacking Tools Free Download
  76. Tools 4 Hack
  77. Hacking Tools Windows 10
  78. Hacking Tools Windows 10
  79. Hack Tool Apk No Root
  80. Hack Tools Pc
  81. Hack Rom Tools
  82. Hacking Tools 2019
  83. Hacker Tools Windows
  84. Pentest Tools Url Fuzzer
  85. How To Make Hacking Tools
  86. Hacker Hardware Tools
  87. Hacking Tools Github
  88. Hack Tools Mac
  89. Hacker Tools Software
  90. Hacking Tools Kit
  91. Pentest Tools Website Vulnerability
  92. Hacker Tools List
  93. Hacks And Tools
  94. Pentest Tools Website Vulnerability
  95. Game Hacking
  96. Hack Tools For Ubuntu
  97. Hacking Tools
  98. How To Install Pentest Tools In Ubuntu
  99. Hack Tools 2019
  100. Pentest Recon Tools
  101. Pentest Tools Github
  102. What Are Hacking Tools
  103. Termux Hacking Tools 2019
  104. Pentest Tools Free
  105. Hak5 Tools
  106. Blackhat Hacker Tools
  107. Hacking Tools 2020
  108. Nsa Hacker Tools
  109. Hacking Tools Name
  110. Hack Tools Download
  111. Pentest Tools Url Fuzzer
  112. Hacker Tools Github
  113. Hacker Techniques Tools And Incident Handling
  114. Hacker Tools Online
  115. Install Pentest Tools Ubuntu
  116. Hacking Tools Windows 10
  117. Hacking Tools Mac

0 条评论:

发表评论

订阅 博文评论 [Atom]



<< 主页