Saturday, August 29, 2020

Rastrea2R - Collecting & Hunting For IOCs With Gusto And Style



Ever wanted to turn your AV console into an Incident Response & Threat Hunting machine? Rastrea2r (pronounced "rastreador" - hunter- in Spanish) is a multi-platform open source tool that allows incident responders and SOC analysts to triage suspect systems and hunt for Indicators of Compromise (IOCs) across thousands of endpoints in minutes. To parse and collect artifacts of interest from remote systems (including memory dumps), rastrea2r can execute sysinternal, system commands and other 3rd party tools across multiples endpoints, saving the output to a centralized share for automated or manual analysis. By using a client/server RESTful API, rastrea2r can also hunt for IOCs on disk and memory across multiple systems using YARA rules. As a command line tool, rastrea2r can be easily integrated within McAfee ePO, as well as other AV consoles and orchestration tools, allowing incident responders and SOC analysts to collect forensic evidence and hunt for IOCs without the need for an additional agent, with 'gusto' and style!


Dependencies
  • Python 2.7.x
  • git
  • bottle
  • requests
  • yara-python

Quickstart
  • Clone the project to your local directory (or download the zip file of the project)
$git clone https://github.com/rastrea2r/rastrea2r.git
$cd rastrea2r
  • All the dependencies necessary for the tool to run can be installed within a virtual environment via the provided makefile.
$make help
help - display this makefile's help information
venv - create a virtual environment for development
clean - clean all files using .gitignore rules
scrub - clean all files, even untracked files
test - run tests
test-verbose - run tests [verbosely]
check-coverage - perform test coverage checks
check-style - perform pep8 check
fix-style - perform check with autopep8 fixes
docs - generate project documentation
check-docs - quick check docs consistency
serve-docs - serve project html documentation
dist - create a wheel distribution package
dist-test - test a wheel distribution package
dist-upload - upload a wheel distribution package
  • Create a virtual environment with all dependencies
$make venv
//Upon successful creation of the virtualenvironment, enter the virtualenvironment as instructed, for ex:
$source /Users/ssbhat/.venvs/rastrea2r/bin/activate
  • Start the rastrea2r server by going to $PROJECT_HOME/src/rastrea2r/server folder
$cd src/rastrea2r/server/
$python rastrea2r_server_v0.3.py
Bottle v0.12.13 server starting up (using WSGIRefServer())...
Listening on http://0.0.0.0:8080/
  • Now execute the client program, depending on which platform you are trying to scan choose the target python script appropriately. Currently Windows, Linux and Mac platforms are supported.
$python rastrea2r_osx_v0.3.py -h
usage: rastrea2r_osx_v0.3.py [-h] [-v] {yara-disk,yara-mem,triage} ...

Rastrea2r RESTful remote Yara/Triage tool for Incident Responders

positional arguments: {yara-disk,yara-mem,triage}

modes of operation
yara-disk Yara scan for file/directory objects on disk
yara-mem Yara scan for running processes in memory
triage Collect triage information from endpoint

optional arguments:
-h, --help show this help message and exit
-v, --version show program's version number and exit


Further more, the available options under each command can be viewed by executing the help option. i,e

$python rastrea2r_osx_v0.3.py yara-disk -h
usage: rastrea2r_osx_v0.3.py yara-disk [-h] [-s] path server rule

positional arguments:
path File or directory path to scan
server rastrea2r REST server
rule Yara rule on REST server

optional arguments:
-h, --help show this help message and exit
-s, --silent Suppresses standard output
  • For ex, on a Mac or Unix system you would do:
$cd src/rastrea2r/osx/

$python rastrea2r_osx_v0.3.py yara-disk /opt http://127.0.0.1:8080/ test.yar

Executing rastrea2r on Windows

Currently Supported functionality
  • yara-disk: Yara scan for file/directory objects on disk
  • yara-mem: Yara scan for running processes in memory
  • memdump: Acquires a memory dump from the endpoint ** Windows only
  • triage: Collects triage information from the endpoint ** Windows only

Notes
For memdump and triage modules, SMB shares must be set up in this specific way:
  • Binaries (sysinternals, batch files and others) must be located in a shared folder called TOOLS (read only)
    \path-to-share-foldertools
  • Output is sent to a shared folder called DATA (write only)
    \path-to-share-folderdata
  • For yara-mem and yara-disk scans, the yara rules must be in the same directory where the server is executed from.
  • The RESTful API server stores data received in a file called results.txt in the same directory.

Contributing to rastrea2r project
The Developer Documentation provides complete information on how to contribute to rastrea2r project

Demo videos on Youtube

Presentations

Credits & References



More articles
  1. What Is Hacking Tools
  2. Tools Used For Hacking
  3. Hacker Tools Hardware
  4. Hacker Tools For Ios
  5. Hacker Tools Apk Download
  6. Hacking Tools Free Download
  7. Hacking Tools Free Download
  8. Pentest Tools Tcp Port Scanner
  9. Hacker Tools Hardware
  10. Hacking Tools For Kali Linux
  11. Ethical Hacker Tools
  12. Pentest Tools For Windows
  13. Hacking Tools For Windows 7
  14. Hacking Apps
  15. Pentest Tools Framework
  16. Hack Tools For Ubuntu
  17. Hacking Tools Download
  18. Usb Pentest Tools
  19. Physical Pentest Tools
  20. Hacker Search Tools
  21. Hacking Tools For Pc
  22. Hackrf Tools
  23. Best Hacking Tools 2019
  24. Black Hat Hacker Tools
  25. Hack Tools Mac
  26. Pentest Tools Github
  27. Hacking Tools For Mac
  28. Hacker Tools Online
  29. Hack And Tools
  30. Hacking Tools For Windows
  31. Hack Tools For Windows
  32. Pentest Tools Open Source
  33. Pentest Tools Linux
  34. Wifi Hacker Tools For Windows
  35. Hacking Tools 2020
  36. Hacker Tools 2019
  37. Hacker Tools Software
  38. Hacking Tools For Mac
  39. Best Hacking Tools 2020
  40. Hacker Tools Online
  41. Hack Tools Download
  42. Tools 4 Hack
  43. Pentest Tools For Android
  44. Hacking Tools For Kali Linux
  45. Pentest Tools Website
  46. Hacking Tools Hardware
  47. Hack And Tools
  48. Hacks And Tools
  49. Tools Used For Hacking
  50. Hacker Tools
  51. Pentest Tools For Mac
  52. Hack Tool Apk
  53. Hacker Tools Github
  54. Hacker Tools 2019
  55. Hacker Security Tools
  56. Physical Pentest Tools
  57. Pentest Tools For Windows
  58. Hacker Tools For Mac
  59. How To Make Hacking Tools
  60. Hack Tool Apk
  61. Easy Hack Tools
  62. Hack Tools 2019
  63. Hacker Techniques Tools And Incident Handling
  64. Pentest Tools For Mac
  65. Hacker Tools Linux
  66. Hacker Tools 2019
  67. Hack App
  68. Pentest Tools List
  69. Pentest Tools Kali Linux
  70. Hack And Tools
  71. Hack Tools Mac
  72. Pentest Tools Kali Linux
  73. Hacker Tools 2019
  74. Pentest Tools For Android
  75. Pentest Tools List
  76. Hacking Tools For Windows
  77. Hacker Tools Apk Download
  78. Pentest Tools Review
  79. How To Make Hacking Tools
  80. Computer Hacker
  81. Pentest Tools Free
  82. Hacker Tools Hardware
  83. Hacking Tools Software
  84. Hack Tools
  85. Pentest Tools Download
  86. How To Make Hacking Tools
  87. Hacking Tools Windows
  88. Hack Tools For Windows
  89. Hackers Toolbox
  90. Hack Tool Apk No Root
  91. Hack Website Online Tool
  92. Pentest Tools Port Scanner
  93. Best Hacking Tools 2019
  94. Termux Hacking Tools 2019
  95. What Are Hacking Tools
  96. Hacker Tools Apk Download
  97. Hackrf Tools
  98. Hack Tool Apk No Root
  99. Pentest Tools Windows
  100. Pentest Tools Tcp Port Scanner
  101. Hacker Tools Apk
  102. Hacking Tools For Beginners
  103. Pentest Tools For Windows
  104. Hack Tool Apk
  105. Hacking Tools Free Download
  106. Best Pentesting Tools 2018
  107. Pentest Tools
  108. Hacker Tools For Windows

No comments: