mihari 2.0.0 → 2.1.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (51) hide show
  1. checksums.yaml +4 -4
  2. data/.github/ISSUE_TEMPLATE/bug_report.md +43 -0
  3. data/.github/ISSUE_TEMPLATE/feature_request.md +15 -0
  4. data/.standard.yml +4 -0
  5. data/README.md +3 -1
  6. data/docker/Dockerfile +2 -1
  7. data/images/web_alerts.png +0 -0
  8. data/lib/mihari/analyzers/base.rb +1 -1
  9. data/lib/mihari/analyzers/securitytrails.rb +2 -2
  10. data/lib/mihari/cli.rb +61 -287
  11. data/lib/mihari/commands/binaryedge.rb +21 -0
  12. data/lib/mihari/commands/censys.rb +22 -0
  13. data/lib/mihari/commands/circl.rb +21 -0
  14. data/lib/mihari/commands/config.rb +21 -0
  15. data/lib/mihari/commands/crtsh.rb +22 -0
  16. data/lib/mihari/commands/dnpedia.rb +21 -0
  17. data/lib/mihari/commands/dnstwister.rb +19 -0
  18. data/lib/mihari/commands/free_text.rb +21 -0
  19. data/lib/mihari/commands/http_hash.rb +25 -0
  20. data/lib/mihari/commands/json.rb +36 -0
  21. data/lib/mihari/commands/onyphe.rb +19 -0
  22. data/lib/mihari/commands/otx.rb +21 -0
  23. data/lib/mihari/commands/passive_dns.rb +19 -0
  24. data/lib/mihari/commands/passive_ssl.rb +21 -0
  25. data/lib/mihari/commands/passivetotal.rb +21 -0
  26. data/lib/mihari/commands/pulsedive.rb +21 -0
  27. data/lib/mihari/commands/reverse_whois.rb +21 -0
  28. data/lib/mihari/commands/securitytrails.rb +20 -0
  29. data/lib/mihari/commands/securitytrails_domain_feed.rb +23 -0
  30. data/lib/mihari/commands/shodan.rb +19 -0
  31. data/lib/mihari/commands/spyse.rb +20 -0
  32. data/lib/mihari/commands/ssh_fingerprint.rb +21 -0
  33. data/lib/mihari/commands/urlscan.rb +23 -0
  34. data/lib/mihari/commands/virustotal.rb +19 -0
  35. data/lib/mihari/commands/web.rb +20 -0
  36. data/lib/mihari/commands/zoomeye.rb +20 -0
  37. data/lib/mihari/config.rb +12 -0
  38. data/lib/mihari/configurable.rb +1 -1
  39. data/lib/mihari/emitters/slack.rb +4 -4
  40. data/lib/mihari/emitters/the_hive.rb +1 -1
  41. data/lib/mihari/models/alert.rb +5 -5
  42. data/lib/mihari/notifiers/exception_notifier.rb +4 -4
  43. data/lib/mihari/status.rb +1 -1
  44. data/lib/mihari/version.rb +1 -1
  45. data/lib/mihari/web/app.rb +45 -5
  46. data/lib/mihari/web/public/index.html +2 -2
  47. data/lib/mihari/web/public/static/js/{app.58b32d15.js → app.280cbdb7.js} +4 -4
  48. data/lib/mihari/web/public/static/js/app.280cbdb7.js.map +1 -0
  49. data/mihari.gemspec +2 -0
  50. metadata +61 -4
  51. data/lib/mihari/web/public/static/js/app.58b32d15.js.map +0 -1
@@ -0,0 +1,21 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Mihari
4
+ module Commands
5
+ module BinaryEdge
6
+ def self.included(thor)
7
+ thor.class_eval do
8
+ desc "binaryedge [QUERY]", "BinaryEdge host search by a query"
9
+ method_option :title, type: :string, desc: "title"
10
+ method_option :description, type: :string, desc: "description"
11
+ method_option :tags, type: :array, desc: "tags"
12
+ def binaryedge(query)
13
+ with_error_handling do
14
+ run_analyzer Analyzers::BinaryEdge, query: query, options: options
15
+ end
16
+ end
17
+ end
18
+ end
19
+ end
20
+ end
21
+ end
@@ -0,0 +1,22 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Mihari
4
+ module Commands
5
+ module Censys
6
+ def self.included(thor)
7
+ thor.class_eval do
8
+ desc "censys [QUERY]", "Censys IPv4 search by a query"
9
+ method_option :title, type: :string, desc: "title"
10
+ method_option :description, type: :string, desc: "description"
11
+ method_option :tags, type: :array, desc: "tags"
12
+ method_option :type, type: :string, desc: "type to search (ipv4 / websites / certificates)", default: "ipv4"
13
+ def censys(query)
14
+ with_error_handling do
15
+ run_analyzer Analyzers::Censys, query: query, options: options
16
+ end
17
+ end
18
+ end
19
+ end
20
+ end
21
+ end
22
+ end
@@ -0,0 +1,21 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Mihari
4
+ module Commands
5
+ module CIRCL
6
+ def self.included(thor)
7
+ thor.class_eval do
8
+ desc "circl [DOMAIN|SHA1]", "CIRCL passive DNS/SSL lookup by a domain or SHA1 certificate fingerprint"
9
+ method_option :title, type: :string, desc: "title"
10
+ method_option :description, type: :string, desc: "description"
11
+ method_option :tags, type: :array, desc: "tags"
12
+ def circl(query)
13
+ with_error_handling do
14
+ run_analyzer Analyzers::CIRCL, query: refang(query), options: options
15
+ end
16
+ end
17
+ end
18
+ end
19
+ end
20
+ end
21
+ end
@@ -0,0 +1,21 @@
1
+ module Mihari
2
+ module Commands
3
+ module Config
4
+ def self.included(thor)
5
+ thor.class_eval do
6
+ desc "init_config", "Create a config file"
7
+ method_option :filename, type: :string, default: "mihari.yml"
8
+ def init_config
9
+ filename = options["filename"]
10
+
11
+ if File.exist?(filename) && !(yes? "#{filename} exists. Do you want to overwrite it? (y/n)")
12
+ return
13
+ end
14
+
15
+ Mihari::Config.initialize_yaml filename
16
+ end
17
+ end
18
+ end
19
+ end
20
+ end
21
+ end
@@ -0,0 +1,22 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Mihari
4
+ module Commands
5
+ module Crtsh
6
+ def self.included(thor)
7
+ thor.class_eval do
8
+ desc "crtsh [QUERY]", "crt.sh search by a query"
9
+ method_option :title, type: :string, desc: "title"
10
+ method_option :description, type: :string, desc: "description"
11
+ method_option :tags, type: :array, desc: "tags"
12
+ method_option :exclude_expired, type: :boolean, desc: "exclude expired certificates"
13
+ def crtsh(query)
14
+ with_error_handling do
15
+ run_analyzer Analyzers::Crtsh, query: query, options: options
16
+ end
17
+ end
18
+ end
19
+ end
20
+ end
21
+ end
22
+ end
@@ -0,0 +1,21 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Mihari
4
+ module Commands
5
+ module DNPedia
6
+ def self.included(thor)
7
+ thor.class_eval do
8
+ desc "dnpedia [QUERY]", "DNPedia domain search by a query"
9
+ method_option :title, type: :string, desc: "title"
10
+ method_option :description, type: :string, desc: "description"
11
+ method_option :tags, type: :array, desc: "tags"
12
+ def dnpedia(query)
13
+ with_error_handling do
14
+ run_analyzer Analyzers::DNPedia, query: query, options: options
15
+ end
16
+ end
17
+ end
18
+ end
19
+ end
20
+ end
21
+ end
@@ -0,0 +1,19 @@
1
+ module Mihari
2
+ module Commands
3
+ module DNSTwister
4
+ def self.included(thor)
5
+ thor.class_eval do
6
+ desc "dnstwister [DOMAIN]", "dnstwister lookup by a domain"
7
+ method_option :title, type: :string, desc: "title"
8
+ method_option :description, type: :string, desc: "description"
9
+ method_option :tags, type: :array, desc: "tags"
10
+ def dnstwister(domain)
11
+ with_error_handling do
12
+ run_analyzer Analyzers::DNSTwister, query: refang(domain), options: options
13
+ end
14
+ end
15
+ end
16
+ end
17
+ end
18
+ end
19
+ end
@@ -0,0 +1,21 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Mihari
4
+ module Commands
5
+ module FreeText
6
+ def self.included(thor)
7
+ thor.class_eval do
8
+ desc "free_text [TEXT]", "Cross search with search engines by a free text"
9
+ method_option :title, type: :string, desc: "title"
10
+ method_option :description, type: :string, desc: "description"
11
+ method_option :tags, type: :array, desc: "tags"
12
+ def free_text(text)
13
+ with_error_handling do
14
+ run_analyzer Analyzers::FreeText, query: text, options: options
15
+ end
16
+ end
17
+ end
18
+ end
19
+ end
20
+ end
21
+ end
@@ -0,0 +1,25 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Mihari
4
+ module Commands
5
+ module HTTPHash
6
+ def self.included(thor)
7
+ thor.class_eval do
8
+ desc "http_hash", "Cross search with search engines by a hash of an HTTP response (SHA256, MD5 and MurmurHash3)"
9
+ method_option :title, type: :string, desc: "title"
10
+ method_option :description, type: :string, desc: "description"
11
+ method_option :tags, type: :array, desc: "tags"
12
+ method_option :md5, type: :string, desc: "MD5 hash"
13
+ method_option :sha256, type: :string, desc: "SHA256 hash"
14
+ method_option :mmh3, type: :numeric, desc: "MurmurHash3 hash"
15
+ method_option :html, type: :string, desc: "path to an HTML file"
16
+ def http_hash
17
+ with_error_handling do
18
+ run_analyzer Analyzers::HTTPHash, query: nil, options: options
19
+ end
20
+ end
21
+ end
22
+ end
23
+ end
24
+ end
25
+ end
@@ -0,0 +1,36 @@
1
+ module Mihari
2
+ module Commands
3
+ module JSON
4
+ def self.included(thor)
5
+ thor.class_eval do
6
+ desc "import_from_json", "Give a JSON input via STDIN"
7
+ def import_from_json(input = nil)
8
+ with_error_handling do
9
+ json = input || $stdin.gets.chomp
10
+ raise ArgumentError, "Input not found: please give an input in a JSON format" unless json
11
+
12
+ json = parse_as_json(json)
13
+ raise ArgumentError, "Invalid input format: an input JSON data should have title, description and artifacts key" unless valid_json?(json)
14
+
15
+ title = json["title"]
16
+ description = json["description"]
17
+ artifacts = json["artifacts"]
18
+ tags = json["tags"] || []
19
+
20
+ basic = Analyzers::Basic.new(title: title, description: description, artifacts: artifacts, source: "json", tags: tags)
21
+ basic.run
22
+ end
23
+ end
24
+
25
+ no_commands do
26
+ def parse_as_json(input)
27
+ ::JSON.parse input
28
+ rescue ::JSON::ParserError => _e
29
+ nil
30
+ end
31
+ end
32
+ end
33
+ end
34
+ end
35
+ end
36
+ end
@@ -0,0 +1,19 @@
1
+ module Mihari
2
+ module Commands
3
+ module Onyphe
4
+ def self.included(thor)
5
+ thor.class_eval do
6
+ desc "onyphe [QUERY]", "Onyphe datascan search by a query"
7
+ method_option :title, type: :string, desc: "title"
8
+ method_option :description, type: :string, desc: "description"
9
+ method_option :tags, type: :array, desc: "tags"
10
+ def onyphe(query)
11
+ with_error_handling do
12
+ run_analyzer Analyzers::Onyphe, query: query, options: options
13
+ end
14
+ end
15
+ end
16
+ end
17
+ end
18
+ end
19
+ end
@@ -0,0 +1,21 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Mihari
4
+ module Commands
5
+ module OTX
6
+ def self.included(thor)
7
+ thor.class_eval do
8
+ desc "otx [IP|DOMAIN]", "OTX lookup by an IP or domain"
9
+ method_option :title, type: :string, desc: "title"
10
+ method_option :description, type: :string, desc: "description"
11
+ method_option :tags, type: :array, desc: "tags"
12
+ def otx(domain)
13
+ with_error_handling do
14
+ run_analyzer Analyzers::OTX, query: refang(domain), options: options
15
+ end
16
+ end
17
+ end
18
+ end
19
+ end
20
+ end
21
+ end
@@ -0,0 +1,19 @@
1
+ module Mihari
2
+ module Commands
3
+ module PassiveDNS
4
+ def self.included(thor)
5
+ thor.class_eval do
6
+ desc "passive_dns [IP|DOMAIN]", "Cross search with passive DNS services by an ip or domain"
7
+ method_option :title, type: :string, desc: "title"
8
+ method_option :description, type: :string, desc: "description"
9
+ method_option :tags, type: :array, desc: "tags"
10
+ def passive_dns(query)
11
+ with_error_handling do
12
+ run_analyzer Analyzers::PassiveDNS, query: refang(query), options: options
13
+ end
14
+ end
15
+ end
16
+ end
17
+ end
18
+ end
19
+ end
@@ -0,0 +1,21 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Mihari
4
+ module Commands
5
+ module PassiveSSL
6
+ def self.included(thor)
7
+ thor.class_eval do
8
+ desc "passive_ssl [SHA1]", "Cross search with passive SSL services by an SHA1 certificate fingerprint"
9
+ method_option :title, type: :string, desc: "title"
10
+ method_option :description, type: :string, desc: "description"
11
+ method_option :tags, type: :array, desc: "tags"
12
+ def passive_ssl(query)
13
+ with_error_handling do
14
+ run_analyzer Analyzers::PassiveSSL, query: query, options: options
15
+ end
16
+ end
17
+ end
18
+ end
19
+ end
20
+ end
21
+ end
@@ -0,0 +1,21 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Mihari
4
+ module Commands
5
+ module PassiveTotal
6
+ def self.included(thor)
7
+ thor.class_eval do
8
+ desc "passivetotal [IP|DOMAIN|EMAIL|SHA1]", "PassiveTotal lookup by an ip, domain, email or SHA1 certificate fingerprint"
9
+ method_option :title, type: :string, desc: "title"
10
+ method_option :description, type: :string, desc: "description"
11
+ method_option :tags, type: :array, desc: "tags"
12
+ def passivetotal(indicator)
13
+ with_error_handling do
14
+ run_analyzer Analyzers::PassiveTotal, query: refang(indicator), options: options
15
+ end
16
+ end
17
+ end
18
+ end
19
+ end
20
+ end
21
+ end
@@ -0,0 +1,21 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Mihari
4
+ module Commands
5
+ module Pulsedive
6
+ def self.included(thor)
7
+ thor.class_eval do
8
+ desc "pulsedive [IP|DOMAIN]", "Pulsedive lookup by an ip or domain"
9
+ method_option :title, type: :string, desc: "title"
10
+ method_option :description, type: :string, desc: "description"
11
+ method_option :tags, type: :array, desc: "tags"
12
+ def pulsedive(indiactor)
13
+ with_error_handling do
14
+ run_analyzer Analyzers::Pulsedive, query: refang(indiactor), options: options
15
+ end
16
+ end
17
+ end
18
+ end
19
+ end
20
+ end
21
+ end
@@ -0,0 +1,21 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Mihari
4
+ module Commands
5
+ module ReverseWhois
6
+ def self.included(thor)
7
+ thor.class_eval do
8
+ desc "reverse_whois [EMAIL]", "Cross search with reverse whois services by an email"
9
+ method_option :title, type: :string, desc: "title"
10
+ method_option :description, type: :string, desc: "description"
11
+ method_option :tags, type: :array, desc: "tags"
12
+ def reverse_whois(query)
13
+ with_error_handling do
14
+ run_analyzer Analyzers::ReveseWhois, query: refang(query), options: options
15
+ end
16
+ end
17
+ end
18
+ end
19
+ end
20
+ end
21
+ end
@@ -0,0 +1,20 @@
1
+ module Mihari
2
+ module Commands
3
+ module SecurityTrails
4
+ def self.included(thor)
5
+ thor.class_eval do
6
+ desc "securitytrails [IP|DOMAIN|EMAIL]", "SecurityTrails lookup by an ip, domain or email"
7
+ method_option :title, type: :string, desc: "title"
8
+ method_option :description, type: :string, desc: "description"
9
+ method_option :tags, type: :array, desc: "tags"
10
+ def securitytrails(indiactor)
11
+ with_error_handling do
12
+ run_analyzer Analyzers::SecurityTrails, query: refang(indiactor), options: options
13
+ end
14
+ end
15
+ map "st" => :securitytrails
16
+ end
17
+ end
18
+ end
19
+ end
20
+ end
@@ -0,0 +1,23 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Mihari
4
+ module Commands
5
+ module SecurityTrailsDomainFeed
6
+ def self.included(thor)
7
+ thor.class_eval do
8
+ desc "securitytrails_domain_feed [REGEXP]", "SecurityTrails new domain feed search by a regexp"
9
+ method_option :title, type: :string, desc: "title"
10
+ method_option :description, type: :string, desc: "description"
11
+ method_option :tags, type: :array, desc: "tags"
12
+ method_option :type, type: :string, default: "registered", desc: "A type of domain feed ('all', 'new' or 'registered')"
13
+ def securitytrails_domain_feed(regexp)
14
+ with_error_handling do
15
+ run_analyzer Analyzers::SecurityTrailsDomainFeed, query: regexp, options: options
16
+ end
17
+ end
18
+ map "st_domain_feed" => :securitytrails_domain_feedd
19
+ end
20
+ end
21
+ end
22
+ end
23
+ end