Skip to content

Commit

Permalink
Merge v1.4
Browse files Browse the repository at this point in the history
- Remove lookup table and third-party libraries from project
- Update pip install script and requirements.txt
- Modified the Feed Overview dashboard
- Added The Round Table dashboard
- Added Phishing Catcher dashboard
- Support for GreyNoise API key usage
- Modifed Twitter result count
- Other minor updates
  • Loading branch information
ecstatic-nobel committed Nov 23, 2018
2 parents 4fd6d2c + 4a632fa commit 58de13d
Show file tree
Hide file tree
Showing 362 changed files with 2,782 additions and 322,650 deletions.
72 changes: 64 additions & 8 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,7 @@ The fix? **OSweep™**.
```bash
cd /opt/splunk/etc/apps
git clone https://github.com/leunammejii/osweep.git
mv osweep-master osweep
sudo -H -u $SPLUNK_USER /opt/splunk/bin/splunk restart # $SPLUNK_USER = User running Splunk
```
2. Edit "config.py" and add the necessary values as strings to the config file:
Expand All @@ -29,23 +30,37 @@ vim ./osweep/etc/config.py
```
Note: Values for the proxies should be the full URL including the port (ex. http://\<IP Adress\>:\<Port\>).
3. Save "config.py" and close the terminal.
4. Install Pip packages:
```bash
cd /opt/splunk/etc/apps/osweep/bin
bash py_pkg_update.sh
```


#### Commands
- crtsh - https://crt.sh/
- cybercrimeTracker - http://cybercrime-tracker.net/index.php
- greyNoise - https://greynoise.io/
- phishingCatcher - https://github.com/x0rz/phishing_catcher
- ransomwareTracker - https://ransomwaretracker.abuse.ch/
- threatcrowd - https://www.threatcrowd.org/
- twitter - https://twitter.com/
- urlhaus - https://urlhaus.abuse.ch/
- urlscan - https://urlscan.io/

#### Usage
#### Usage
**Feed Overview - Dashboard**
Three of the dashboards below use lookup tables to store the data feed from the sources. This dasboard shows the current stats compared to the previous day.

![Feed Overview](https://github.com/leunammejii/osweep/blob/master/static/assets/feed_overview_dashboard.png)
![Feed Overview](https://github.com/leunammejii/osweep/blob/master/static/assets/feedOverview_dashboard.png)

**The Round Table - Dashboard**
1. Switch to the **The Round Table** dashboard in the OSweep™ app.
2. Add the list of IOCs to the "IOC (+)" textbox to know which source has the most information.
3. Click "Submit".
4. After the panels have populated, click on one to be redirected to the corresponding dashboard to see the results.

![The Round Table - Dashboard](https://github.com/leunammejii/osweep/blob/master/static/assets/theRoundTable_dashboard.png)

**Certificate Search - Dashboard**
1. Switch to the **Certificate Search** dashboard in the OSweep™ app.
Expand All @@ -67,14 +82,25 @@ Three of the dashboards below use lookup tables to store the data feed from the

or to search for subdomains,

```
| crtsh subdomain <DOMAINS>
| fillnull value="-"
| search NOT "issuer ca id"="-"
| dedup "issuer ca id" "issuer name" "name value" "min cert id" "min entry timestamp" "not before" "not after"
| table "issuer ca id" "issuer name" "name value" "min cert id" "min entry timestamp" "not before" "not after"
| sort - "min cert id"
```

or to search for wildcard,

```
| crtsh wildcard <DOMAINS>
| fillnull value="-"
| search NOT "issuer ca id"="-"
| dedup "issuer ca id" "issuer name" "name value" "min cert id" "min entry timestamp" "not before" "not after"
| table "issuer ca id" "issuer name" "name value" "min cert id" "min entry timestamp" "not before" "not after"
| sort - "min cert id"
```
```

**CyberCrime Tracker - Dashboard**
1. Switch to the **CyberCrime Tracker** dashboard in the OSweep™ app.
Expand All @@ -91,7 +117,7 @@ or to search for subdomains,
| search NOT date="-"
| dedup date url ip "vt latest scan" "vt ip info" type
| table date url ip "vt latest scan" "vt ip info" type
```
```

**Cymon - Dashboard**
1. Switch to the **Cymon** dashboard in the OSweep™ app.
Expand Down Expand Up @@ -129,6 +155,25 @@ or to search for subdomains,
| sort - "Last Updated"
```

**Phishing Catcher - Dashboard**
1. Switch to the **Phishing Catcher** dashboard in the OSweep™ app.
2. Select whether you want to monitor the logs in realtime or add a list of domains.
3. If Monitor Mode is "Yes":
- Add a search string to the 'Base Search' textbox.
- Add the field name of the field containing the domain to the "Field Name" textbox.
- Select the time range to search.
4. If Monitor Mode is "No":
- Add the list of domains to the 'Domain (+)' textbox.
5. Click 'Submit'.

![Phishing Catcher - Dashboard](https://github.com/leunammejii/osweep/blob/master/static/assets/phishingCatcher_dashboard.png)

**Phishing Catcher - Adhoc**
```
| phishingCatcher <DOMAINS>
| table domain "threat level" score
```

**Ransomare Tracker - Dashboard**
1. Manually download data feed (one-time only)
```
Expand Down Expand Up @@ -166,6 +211,17 @@ or to search for subdomains,

![Twitter - Dashboard](https://github.com/leunammejii/osweep/blob/master/static/assets/twitter_dashboard.png)

**Twitter - Adhoc**
```
| twitter <IOCs>
| eval epoch=strptime(timestamp, "%+")
| fillnull value="-"
| search NOT timestamp="-"
| dedup timestamp tweet url
| sort - epoch
| table timestamp tweet url hashtags "search term"
```

**URLhaus - Dashboard**
1. Manually download data feed (one-time only)
```
Expand All @@ -176,7 +232,7 @@ or to search for subdomains,
4. Select whether the results will be grouped and how from the dropdowns.
5. Click 'Submit'.

![URLhaus - Dashboard](https://github.com/leunammejii/osweep/blob/master/static/assets/urlhaus_dashboard.png)
![URLhaus - Dashboard](https://github.com/leunammejii/osweep/blob/master/static/assets/urlhaus_dashboard.png)

**URLhaus - Adhoc**
```
Expand All @@ -185,15 +241,15 @@ or to search for subdomains,
| search NOT "provided ioc"="-"
| dedup id dateadded url payload "url status" threat tags "urlhaus link"
| table id dateadded url payload "url status" threat tags "urlhaus link"
```
```

**<span>urlscan</span>.io - Dashboard**
1. Switch to the **<span>urlscan</span>.io** dashboard in the OSweep™ app.
2. Add the list of IOCs to the 'Domain, IP, SHA256 (+)' textbox.
3. Select whether the results will be grouped and how from the dropdowns.
4. Click 'Submit'.

![urlscanio - Dashboard](https://github.com/leunammejii/osweep/blob/master/static/assets/urlscan_dashboard.png)
![urlscanio - Dashboard](https://github.com/leunammejii/osweep/blob/master/static/assets/urlscan_dashboard.png)

**<span>urlscan</span>.io - Adhoc**
```
Expand All @@ -203,7 +259,7 @@ or to search for subdomains,
| dedup url domain ip ptr server city country asn asnname filename filesize mimetype sha256
| table url domain ip ptr server city country asn asnname filename filesize mimetype sha256
| sort sha256
```
```

#### Destroy
To remove the project completely, run the following commands:
Expand Down
File renamed without changes.
18 changes: 0 additions & 18 deletions bin/_tp_modules/HTMLParser-0.0.2.egg-info/PKG-INFO

This file was deleted.

10 changes: 0 additions & 10 deletions bin/_tp_modules/HTMLParser-0.0.2.egg-info/SOURCES.txt

This file was deleted.

This file was deleted.

7 changes: 0 additions & 7 deletions bin/_tp_modules/HTMLParser-0.0.2.egg-info/installed-files.txt

This file was deleted.

1 change: 0 additions & 1 deletion bin/_tp_modules/HTMLParser-0.0.2.egg-info/not-zip-safe

This file was deleted.

1 change: 0 additions & 1 deletion bin/_tp_modules/HTMLParser-0.0.2.egg-info/top_level.txt

This file was deleted.

Loading

0 comments on commit 58de13d

Please sign in to comment.