博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
My Favorite Open Source Security Tools
阅读量:6785 次
发布时间:2019-06-26

本文共 3344 字,大约阅读时间需要 11 分钟。

So working at  it is no surprise I believe in and use a lot of open source software. I think especially for security this makes sense, for a number of reasons:

  • We need tools we can trust, so transparency is key
  • We need tools we can modify, since we often need things that don’t exist
  • We need tools that are cross platform

And the list goes on. I try to support these projects, with code, with feedback, with use, and sometimes, with praise. So, in sort of a weird security  here are a few of my favorite open source security tools:

Ok, #realtalk: This is an open source version of /’s MIR incident response platform. The idea is systems have an agent that reports to a server. The server can then set up jobs to look across an individual system, a group, or an entire population for a specific indicator of compromise, individual file, or many other forensic artifacts.

Given the expense of MIR or similar systems like Encase Enterprise it’s truly astonishing the amount of effort the Google team working on GRR has put in, and it’s a huge benefit to the community that they’ve released it. You can find more information on their  and  site. ~~As a side note I made a fork on GitHub to encourage even more open source collaboration.~~ Google has even moved GRR development to GitHub:. I’m really interested in talking to folks who want to work on this.

So if GRR is an open source version of MIR then Moloch is an open source version of EMC/RSA/Netwitness’s  full content monitoring tool. Put together by the fine folks at AOL Moloch helps you capture and hunt in network traffic.

Oh the fine folks from Etsy & Facebook gave us a gift. MIDAS, the Mac Intrusion Detection Analysis System, is a framework for building host level detection of compromises specifically for OSX. It allows building complex detection routines in Python, then provides the structure to run, store, and report on them. I’ve done a bit of work with this and see amazing potential long term.

So this project hasn’t gotten a lot of love lately, but it’s hugely interesting to me. There aren’t a lot of tools that try to make it easier to collaborate on forensic investigations, in fact most seem hell bent on the exact opposite. I’d love to see more work on this tool, and will be setting it up at home soon.

So you know that time you have to go investigate a nasty web page? There are plenty of options: fire up a virtual machine, try to use a stripped down browser, curl the site. All of these give away some amount of information that you’re profiling, and may miss things. Thug seeks to fix this, by providing a safe (not a real web browser) method that still correctly emulates what a browser would look like (such as an IE7 user agent string instead of a curl user agent string). Thug makes it safe, easy, and quick to do this type of analysis.

Cuckoo Sandbox is easily one of the most mature open source security tools available, and the team behind it should be applauded for that. A malware analysis system, Cuckoo runs malware through a VM, captures system changes, web traffic, and other malware relevant activity and shares it with the analyst. Having just gone  they’ve added tons of features, improved stability, and put this tool on par with more expensive commercial malware systems. If you work with Windows based malware, this system should be in your arsenal.

转载地址:http://wadgo.baihongyu.com/

你可能感兴趣的文章
CMD框变小字体显示乱码
查看>>
正则总结:JavaScript中的正则表达式
查看>>
HAProxy 详解
查看>>
7.1文件查找之find命令详解
查看>>
Linux系统管理-(11)-网络配置ifcfg家族
查看>>
memset()
查看>>
Jquery Ajax二次封装(部分转载)
查看>>
android studio3 logcat无日志的问题
查看>>
我的友情链接
查看>>
tinyxml使用
查看>>
mariadb
查看>>
iOS 时间与日期处理
查看>>
Linux中yum网络服务器与本地服务器的安装
查看>>
[2013.12.28更新:构建教程,支持CB2、CT] 构建自己的Debian Linux
查看>>
flume+kafka+storm运行实例
查看>>
mysql show processlist分析
查看>>
Juniper NetScreen MIP转换
查看>>
巧妙安装各种Windows操作系统
查看>>
我的友情链接
查看>>
近期搜集的云应用和云计算云开发平台精选
查看>>