pgmkcode/gossip-hive
GitHub: pgmkcode/gossip-hive
将 T-Pot 蜜罐攻击数据自动转化为 MISP 威胁情报的自动化工具,支持丰富的标签分类和上下文关联。
Stars: 0 | Forks: 0
# Gossip-Hive
T-Pot 作为网络威胁情报源
## 介绍
Gossip-Hive 最初是我在 [UNLP](https://unlp.edu.ar/)(拉普拉塔国立大学)的 [LINTI](https://www.linti.unlp.edu.ar/)(新技术信息学研究实验室)工作期间,攻读网络与安全研究生学位时开发的一个项目构思。在此期间,我在各种会议和研讨会上展示了研究进展。最终文档见 [SEDICI](https://sedici.unlp.edu.ar/handle/10915/190822)。
完成研究生课程(最终绩点:9.33)后,我继续在业余时间维护和进一步开发该项目。
## Gossip Hive for MISP 如何工作?
Gossip Hive 按设定频率收集 T-Pot 收到的攻击。系统会设定接收攻击的端口以及需要排除的 IP 地址(建议排除 T-Pot 自身的地址)。当向 MISP 报告攻击时,会创建一个带有相应分类法和星系的事件,并对收到的攻击的特定对象进行标记。
## Gossip-Hive for MISP 系统要求
* MISP
* T-Pot
## Gossip-Hive 功能
- 自动标签(Galaxies 和 Taxonomies)
- 关联选项
- 目标端口、协议以及首次攻击的日期/时间
- Suricata 警报和签名
- 攻击计数
- IP 地址信息(国家、ASN 名称、ASN 编号和信誉)
### T-Pot 步骤
* 从 T-Pot 暴露 ElasticSearch 端口(切记,即使每次生成 _custom-docker-compose.yml_ 时也要保留此设置)
```
sed -i 's|127.0.0.1:64298:9200|0.0.0.0:64298:9200|' ~/tpotce/docker-compose.yml
```
* 获取 Elasticsearch API URL 并在 .env 中设置
```
ELASTICSEARCH_URL
```
* 排除 T-Pot IP 地址
```
EXCLUDED_SRC_IPS
```
### MISP 步骤
* 获取 MISP API KEY 并在 .env 中设置
```
MISP_KEY
```
* 获取 MISP API URL 并在 .env 中设置
```
MISP_URL
```
* 如有需要,检查其他参数
### Gossip-Hive 步骤
```
sudo apt update
sudo apt install -y python3 python3-venv python3-pip
python3 -m venv gossip-hive
source gossip-hive/bin/activate
pip install --upgrade pip
pip install -r requirements.txt
python3 gossip-hive-misp.py
```
### Gossip-Hive 运行频率
```
python3 gossip-hive-misp.py --minutes=15
```
默认频率为 60 分钟。
* 配置 cron 作业以使用相同的时间参数执行它。
### 截图
- [MISP - 事件](https://github.com/pgmkcode/gossip-hive/blob/main/img/misp-event.png)
- [MISP - 对象 - Honeypot](https://github.com/pgmkcode/gossip-hive/blob/main/img/misp-object-honeypot.png)
- [MISP - 对象 - Suricata 警报](https://github.com/pgmkcode/gossip-hive/blob/main/img/misp-object-suricata-alert.png)
- [MISP - 对象 - Suricata](https://github.com/pgmkcode/gossip-hive/blob/main/img/misp-object-suricata.png)
### T-Pot 兼容的蜜罐
- Adbhoney
- CitrixHoneypot
- Ciscoasa
- ConPot
- Cowrie
- Ddospot
- Dicompot
- Dionaea
- ElasticPot
- Endlessh
- Go-pot
- Heralding
- Honeypots
- Honeyaml
- Ipphoney
- Log4pot
- Mailoney
- Medpot
- Miniprint
- Tanner
- Redishoneypot
- Sentrypeer
- Wordpot
### MISP 中使用的 Galaxies 和 taxonomies
- TLP
- PAP
- cssa:sharing-class
- cssa:origin
- admiralty-scale:source-reliability
- misp-galaxy:mitre-d3fend
- misp-galaxy:mitre-attack-pattern
- honeypot-basic:communication-interface
- honeypot-basic:data-capture
- honeypot-basic:interaction-level
- diamond-model:Infrastructure
- kill-chain:Exploitation
- kill-chain:Reconnaissance
### 许可证
GPLv2: [conpot](https://github.com/mushorg/conpot/blob/master/LICENSE.txt), [galah](https://github.com/0x4D31/galah?tab=Apache-2.0-1-ov-file#readme), [dionaea](https://github.com/DinoTools/dionaea/blob/master/LICENSE), [honeytrap](https://github.com/armedpot/honeytrap/blob/master/LICENSE), [suricata](https://suricata.io/features/open-source/)
GPLv3: [T-Pot](https://github.com/telekom-security/tpotce?tab=GPL-3.0-1-ov-file#readme), [adbhoney](https://github.com/huuck/ADBHoney), [elasticpot](https://gitlab.com/bontchev/elasticpot/-/blob/master/LICENSE), [ewsposter](https://github.com/telekom-security/ewsposter), [log4pot](https://github.com/thomaspatzke/Log4Pot/blob/master/LICENSE), [fatt](https://github.com/0x4D31/fatt/blob/master/LICENSE), [heralding](https://github.com/johnnykv/heralding/blob/master/LICENSE.txt), [ipphoney](https://gitlab.com/bontchev/ipphoney/-/blob/master/LICENSE), [miniprint](https://github.com/sa7mon/miniprint?tab=GPL-3.0-1-ov-file#readme), [redishoneypot](https://github.com/cypwnpwnsocute/RedisHoneyPot/blob/main/LICENSE), [sentrypeer](https://github.com/SentryPeer/SentryPeer/blob/main/LICENSE.GPL-3.0-only), [snare](https://github.com/mushorg/snare/blob/master/LICENSE), [tanner](https://github.com/mushorg/snare/blob/master/LICENSE)
Apache 2 许可证: [cyberchef](https://github.com/gchq/CyberChef/blob/master/LICENSE), [dicompot](https://github.com/nsmfoo/dicompot/blob/master/LICENSE), [elasticsearch](https://github.com/elasticsearch/elasticsearch/blob/master/LICENSE.txt), [go-pot](https://github.com/ryanolee/go-pot?tab=License-1-ov-file#readme), [h0neytr4p](https://github.com/pbssubhash/h0neytr4p?tab=Apache-2.0-1-ov-file#readme), [logstash](https://github.com/elasticsearch/logstash/blob/master/LICENSE.txt), [kibana](https://github.com/elasticsearch/kibana/blob/master/LICENSE.txt), [docker](https://github.com/docker/docker/blob/master/LICENSE)
MIT 许可证: [autoheal](https://github.com/willfarrell/docker-autoheal?tab=MIT-1-ov-file#readme), [beelzebub](https://github.com/mariocandela/beelzebub?tab=MIT-1-ov-file#readme), [ciscoasa](https://github.com/Cymmetria/ciscoasa_honeypot/blob/master/LICENSE), [ddospot](https://github.com/aelth/ddospot/blob/master/LICENSE), [elasticvue](https://github.com/cars10/elasticvue/blob/master/LICENSE), [glutton](https://github.com/mushorg/glutton/blob/master/LICENSE), [hellpot](https://github.com/yunginnanet/HellPot/blob/master/LICENSE), [honeyaml](https://github.com/mmta/honeyaml?tab=MIT-1-ov-file#readme), [maltrail](https://github.com/stamparm/maltrail/blob/master/LICENSE)
Unlicense: [endlessh](https://github.com/skeeto/endlessh/blob/master/UNLICENSE)
其他: [citrixhoneypot](https://github.com/MalwareTech/CitrixHoneypot#licencing-agreement-malwaretech-public-licence), [cowrie](https://github.com/cowrie/cowrie/blob/master/LICENSE.rst), [mailoney](https://github.com/awhitehatter/mailoney), [Elastic 许可证](https://www.elastic.co/licensing/elastic-license), [Wordpot](https://github.com/gbrindisi/wordpot)
AGPL-3.0: [MISP](https://github.com/MISP/MISP?tab=AGPL-3.0-1-ov-file#readme) [honeypots](https://github.com/qeeqbox/honeypots/blob/main/LICENSE) [IntelOwl](https://github.com/intelowlproject/IntelOwl?tab=AGPL-3.0-1-ov-file#readme)
[公共领域 (CC)](https://creativecommons.org/publicdomain/zero/1.0/): [Harvard Dataverse](https://dataverse.harvard.edu/dataverse/harvard/?q=dicom)
### Logo 许可证
项目 Logo 采用 CC BY-ND 4.0 许可。
详情请参阅 LICENSE-LOGO.md。
标签:CISA项目, Elasticsearch, ESC4, HTTP/HTTPS抓包, Metaprompt, OSINT, PFX证书, Suricata, 命令控制, 威胁共享, 威胁情报, 安全运营, 安全集成, 密码管理, 开发者工具, 态势感知, 恶意IP分析, 扫描框架, 攻击检测, 数据采集, 现代安全运营, 网络安全, 自动化响应, 蜜罐, 证书利用, 请求拦截, 逆向工具, 隐私保护