shadowbq-threatinator 0.5.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (389) hide show
  1. checksums.yaml +7 -0
  2. data/CHANGELOG.md +66 -0
  3. data/CONTRIBUTING.md +119 -0
  4. data/Gemfile +38 -0
  5. data/LICENSE +165 -0
  6. data/README.md +101 -0
  7. data/Rakefile +47 -0
  8. data/VERSION +1 -0
  9. data/bin/threatinator +5 -0
  10. data/bin/threatinator_loader +21 -0
  11. data/feeds/ET_block-ip_reputation.feed +27 -0
  12. data/feeds/ET_compromised-ip_reputation.feed +20 -0
  13. data/feeds/ET_openbadlist-ip_reputation.feed +36 -0
  14. data/feeds/alienvault-ip_reputation.feed +39 -0
  15. data/feeds/arbor_fastflux-domain_reputation.feed +19 -0
  16. data/feeds/arbor_ssh-ip_reputation.feed +24 -0
  17. data/feeds/autoshun_shunlist.feed +17 -0
  18. data/feeds/bambenek_c2_masterlist-domain_reputation.feed +16 -0
  19. data/feeds/bambenek_c2_masterlist-ip_reputation.feed +16 -0
  20. data/feeds/bambenek_dga_feed-domain_reputation.feed +16 -0
  21. data/feeds/berkeley-ip_reputation.feed +25 -0
  22. data/feeds/bitcash_cz_blacklist.feed +22 -0
  23. data/feeds/blocklist_de_apache-ip_reputation.feed +26 -0
  24. data/feeds/blocklist_de_bots-ip_reputation.feed +26 -0
  25. data/feeds/blocklist_de_ftp-ip_reputation.feed +25 -0
  26. data/feeds/blocklist_de_imap-ip_reputation.feed +25 -0
  27. data/feeds/blocklist_de_pop3-ip_reputation.feed +26 -0
  28. data/feeds/blocklist_de_proftpd-ip_reputation.feed +26 -0
  29. data/feeds/blocklist_de_sip-ip_reputation.feed +25 -0
  30. data/feeds/blocklist_de_ssh-ip_reputation.feed +25 -0
  31. data/feeds/blocklist_de_strongips-ip_reputation.feed +25 -0
  32. data/feeds/botscout-ip_reputation.feed +25 -0
  33. data/feeds/cert_mxpoison-ip_reputation.feed +22 -0
  34. data/feeds/chaosreigns-ip_reputation.feed +37 -0
  35. data/feeds/ciarmy-ip_reputation.feed +20 -0
  36. data/feeds/cruzit-ip_reputation.feed +30 -0
  37. data/feeds/cydef_torexit-ip_reputation.feed +25 -0
  38. data/feeds/dan_me_uk_torlist-ip_reputation.feed +25 -0
  39. data/feeds/danger_bruteforce-ip_reputation.feed +24 -0
  40. data/feeds/dshield_attackers-top1000.feed +34 -0
  41. data/feeds/falconcrest-ip_reputation.feed +19 -0
  42. data/feeds/feodo-domain_reputation.feed +19 -0
  43. data/feeds/feodo-ip_reputation.feed +20 -0
  44. data/feeds/h3x_asprox.feed +18 -0
  45. data/feeds/hosts-file_hphostspartial-domain_reputation.feed +19 -0
  46. data/feeds/infiltrated-ip_reputation.feed +26 -0
  47. data/feeds/infiltrated_vabl-ip_reputation.feed +30 -0
  48. data/feeds/isc_suspicious_high-domain_reputation.feed +26 -0
  49. data/feeds/isc_suspicious_low-domain_reputation.feed +26 -0
  50. data/feeds/isc_suspicious_medium-domain_reputation.feed +26 -0
  51. data/feeds/malc0de-domain_reputation.feed +24 -0
  52. data/feeds/malc0de-ip_reputation.feed +26 -0
  53. data/feeds/malwaredomainlist-url_reputation.feed +18 -0
  54. data/feeds/malwaredomains-domain_reputation.feed +29 -0
  55. data/feeds/malwaredomains_dyndns-domain_reputation.feed +29 -0
  56. data/feeds/malwaredomains_justdomains-domain_reputation.feed +20 -0
  57. data/feeds/mirc-domain_reputation.feed +30 -0
  58. data/feeds/multiproxy-ip_reputation.feed +22 -0
  59. data/feeds/nothink_irc-ip_reputation.feed +23 -0
  60. data/feeds/nothink_ssh-ip_reputation.feed +21 -0
  61. data/feeds/openbl-ip_reputation.feed +21 -0
  62. data/feeds/openphish-url_reputation.feed +24 -0
  63. data/feeds/packetmail_perimeterbad-ip_reputation.feed +28 -0
  64. data/feeds/palevo-domain_reputation.feed +22 -0
  65. data/feeds/palevo-ip_reputation.feed +23 -0
  66. data/feeds/phishtank.feed +22 -0
  67. data/feeds/sigmaproject_atma.feed +27 -0
  68. data/feeds/sigmaproject_spyware.feed +28 -0
  69. data/feeds/sigmaproject_webexploit.feed +26 -0
  70. data/feeds/snort_bpf-ip_reputation.feed +19 -0
  71. data/feeds/spyeye-domain_reputation.feed +18 -0
  72. data/feeds/spyeye-ip_reputation.feed +19 -0
  73. data/feeds/steeman-ip_reputation.feed +20 -0
  74. data/feeds/t-arend-de_ssh-ip_reputation.feed +20 -0
  75. data/feeds/the_haleys_ssh-ip_reputation.feed +20 -0
  76. data/feeds/trustedsec-ip_reputation.feed +18 -0
  77. data/feeds/virbl-ip_reputation.feed +25 -0
  78. data/feeds/vxvault-url_reputation.feed +23 -0
  79. data/feeds/yourcmc_ssh-ip_reputation.feed +20 -0
  80. data/feeds/yoyo_adservers-domain_reputation.feed +17 -0
  81. data/feeds/zeus-domain_reputation.feed +19 -0
  82. data/feeds/zeus-ip_reputation.feed +21 -0
  83. data/lib/threatinator/action.rb +14 -0
  84. data/lib/threatinator/actions/list/action.rb +97 -0
  85. data/lib/threatinator/actions/list/config.rb +12 -0
  86. data/lib/threatinator/actions/list.rb +2 -0
  87. data/lib/threatinator/actions/run/action.rb +57 -0
  88. data/lib/threatinator/actions/run/config.rb +32 -0
  89. data/lib/threatinator/actions/run/coverage_observer.rb +59 -0
  90. data/lib/threatinator/actions/run/output_config.rb +59 -0
  91. data/lib/threatinator/actions/run/status_observer.rb +37 -0
  92. data/lib/threatinator/actions/run.rb +2 -0
  93. data/lib/threatinator/cli/action_builder.rb +33 -0
  94. data/lib/threatinator/cli/list_action_builder.rb +19 -0
  95. data/lib/threatinator/cli/parser.rb +123 -0
  96. data/lib/threatinator/cli/run_action_builder.rb +41 -0
  97. data/lib/threatinator/cli.rb +19 -0
  98. data/lib/threatinator/config/base.rb +35 -0
  99. data/lib/threatinator/config/feed_search.rb +25 -0
  100. data/lib/threatinator/config/logger.rb +14 -0
  101. data/lib/threatinator/config.rb +7 -0
  102. data/lib/threatinator/decoder.rb +24 -0
  103. data/lib/threatinator/decoders/gzip.rb +30 -0
  104. data/lib/threatinator/event.rb +63 -0
  105. data/lib/threatinator/event_builder.rb +70 -0
  106. data/lib/threatinator/exceptions.rb +58 -0
  107. data/lib/threatinator/feed.rb +88 -0
  108. data/lib/threatinator/feed_builder.rb +161 -0
  109. data/lib/threatinator/feed_registry.rb +47 -0
  110. data/lib/threatinator/feed_runner.rb +177 -0
  111. data/lib/threatinator/fetcher.rb +22 -0
  112. data/lib/threatinator/fetchers/http.rb +50 -0
  113. data/lib/threatinator/filter.rb +12 -0
  114. data/lib/threatinator/filters/block.rb +18 -0
  115. data/lib/threatinator/filters/comments.rb +16 -0
  116. data/lib/threatinator/filters/whitespace.rb +19 -0
  117. data/lib/threatinator/logger.rb +66 -0
  118. data/lib/threatinator/logging.rb +20 -0
  119. data/lib/threatinator/model/base.rb +23 -0
  120. data/lib/threatinator/model/collection.rb +89 -0
  121. data/lib/threatinator/model/observables/fqdn_collection.rb +15 -0
  122. data/lib/threatinator/model/observables/ipv4.rb +33 -0
  123. data/lib/threatinator/model/observables/ipv4_collection.rb +14 -0
  124. data/lib/threatinator/model/observables/url_collection.rb +16 -0
  125. data/lib/threatinator/model/validations/type.rb +21 -0
  126. data/lib/threatinator/model/validations.rb +1 -0
  127. data/lib/threatinator/output.rb +50 -0
  128. data/lib/threatinator/parser.rb +23 -0
  129. data/lib/threatinator/parsers/csv/parser.rb +77 -0
  130. data/lib/threatinator/parsers/csv.rb +7 -0
  131. data/lib/threatinator/parsers/getline/parser.rb +45 -0
  132. data/lib/threatinator/parsers/getline.rb +8 -0
  133. data/lib/threatinator/parsers/json/adapters/oj.rb +65 -0
  134. data/lib/threatinator/parsers/json/parser.rb +45 -0
  135. data/lib/threatinator/parsers/json/record.rb +20 -0
  136. data/lib/threatinator/parsers/json.rb +8 -0
  137. data/lib/threatinator/parsers/xml/node.rb +79 -0
  138. data/lib/threatinator/parsers/xml/node_builder.rb +39 -0
  139. data/lib/threatinator/parsers/xml/parser.rb +44 -0
  140. data/lib/threatinator/parsers/xml/path.rb +70 -0
  141. data/lib/threatinator/parsers/xml/pattern.rb +53 -0
  142. data/lib/threatinator/parsers/xml/record.rb +14 -0
  143. data/lib/threatinator/parsers/xml/sax_document.rb +64 -0
  144. data/lib/threatinator/parsers/xml.rb +8 -0
  145. data/lib/threatinator/plugin_loader.rb +115 -0
  146. data/lib/threatinator/plugins/output/amqp/config.rb +18 -0
  147. data/lib/threatinator/plugins/output/amqp.rb +41 -0
  148. data/lib/threatinator/plugins/output/csv.rb +58 -0
  149. data/lib/threatinator/plugins/output/json/config.rb +14 -0
  150. data/lib/threatinator/plugins/output/json.rb +53 -0
  151. data/lib/threatinator/plugins/output/null.rb +17 -0
  152. data/lib/threatinator/plugins/output/rubydebug.rb +16 -0
  153. data/lib/threatinator/record.rb +22 -0
  154. data/lib/threatinator/registry.rb +53 -0
  155. data/lib/threatinator/util.rb +15 -0
  156. data/lib/threatinator.rb +3 -0
  157. data/spec/feeds/ET_block-ip_reputation_spec.rb +50 -0
  158. data/spec/feeds/ET_compromised-ip_reputation_spec.rb +47 -0
  159. data/spec/feeds/ET_openbadlist-ip_reputation_spec.rb +56 -0
  160. data/spec/feeds/alienvault-ip_reputation_spec.rb +46 -0
  161. data/spec/feeds/arbor_fastflux-domain_reputation_spec.rb +46 -0
  162. data/spec/feeds/arbor_ssh-ip_reputation_spec.rb +46 -0
  163. data/spec/feeds/autoshun_shunlist_spec.rb +38 -0
  164. data/spec/feeds/bambenek_c2_masterlist-domain_reputation_spec.rb +38 -0
  165. data/spec/feeds/bambenek_c2_masterlist-ip_reputation_spec.rb +39 -0
  166. data/spec/feeds/bambenek_dga_feed-domain_reputation_spec.rb +39 -0
  167. data/spec/feeds/berkeley-ip_reputation_spec.rb +47 -0
  168. data/spec/feeds/bitcash_cz_blacklist-ip_reputation_spec.rb +50 -0
  169. data/spec/feeds/blocklist_de_apache-ip_reputation_spec.rb +47 -0
  170. data/spec/feeds/blocklist_de_bots-ip_reputation_spec.rb +47 -0
  171. data/spec/feeds/blocklist_de_ftp-ip_reputation_spec.rb +47 -0
  172. data/spec/feeds/blocklist_de_imap-ip_reputation_spec.rb +47 -0
  173. data/spec/feeds/blocklist_de_pop3-ip_reputation_spec.rb +47 -0
  174. data/spec/feeds/blocklist_de_proftpd-ip_reputation_spec.rb +47 -0
  175. data/spec/feeds/blocklist_de_sip-ip_reputation_spec.rb +47 -0
  176. data/spec/feeds/blocklist_de_ssh-ip_reputation_spec.rb +47 -0
  177. data/spec/feeds/blocklist_de_strongips-ip_reputation_spec.rb +47 -0
  178. data/spec/feeds/botscout-ip_reputation_spec.rb +50 -0
  179. data/spec/feeds/cert_mxpoison-ip_reputation_spec.rb +47 -0
  180. data/spec/feeds/chaosreigns-ip_reputation_spec.rb +50 -0
  181. data/spec/feeds/ciarmy-ip_reputation_spec.rb +47 -0
  182. data/spec/feeds/cruzit-ip_reputation_spec.rb +47 -0
  183. data/spec/feeds/cydef_torexit-ip_reputation_spec.rb +47 -0
  184. data/spec/feeds/dan_me_uk_torlist-ip_reputation_spec.rb +47 -0
  185. data/spec/feeds/danger_bruteforce-ip_reputation_spec.rb +47 -0
  186. data/spec/feeds/data/ET_block-ip_reputation.txt +80 -0
  187. data/spec/feeds/data/ET_compromised-ip_reputation.txt +11 -0
  188. data/spec/feeds/data/ET_openbadlist-ip_reputation.txt +62 -0
  189. data/spec/feeds/data/alienvault-ip_reputation.txt +18 -0
  190. data/spec/feeds/data/arbor_domainlist.txt +11 -0
  191. data/spec/feeds/data/arbor_ssh.txt +16 -0
  192. data/spec/feeds/data/autoshun_shunlist.csv +20 -0
  193. data/spec/feeds/data/bambenek_c2-dommasterlist.csv +30 -0
  194. data/spec/feeds/data/bambenek_c2-ipmasterlist.csv +27 -0
  195. data/spec/feeds/data/bambenek_dga_feed.csv +42 -0
  196. data/spec/feeds/data/berkeley.txt +29 -0
  197. data/spec/feeds/data/bitcash_cz_blacklist.txt +7 -0
  198. data/spec/feeds/data/blocklist_de_apache-ip-reputation.txt +17 -0
  199. data/spec/feeds/data/blocklist_de_bots-ip-reputation.txt +15 -0
  200. data/spec/feeds/data/blocklist_de_ftp-ip-reputation.txt +7 -0
  201. data/spec/feeds/data/blocklist_de_imap-ip-reputation.txt +8 -0
  202. data/spec/feeds/data/blocklist_de_pop3-ip-reputation.txt +11 -0
  203. data/spec/feeds/data/blocklist_de_proftpd-ip-reputation.txt +12 -0
  204. data/spec/feeds/data/blocklist_de_sip-ip-reputation.txt +9 -0
  205. data/spec/feeds/data/blocklist_de_ssh-ip-reputation.txt +10 -0
  206. data/spec/feeds/data/blocklist_de_strongips-ip-reputation.txt +11 -0
  207. data/spec/feeds/data/botscout-ip-reputation.txt +713 -0
  208. data/spec/feeds/data/cert_mxpoison-ip_reputation.txt +17 -0
  209. data/spec/feeds/data/chaosreigns-ip-reputation.txt +26 -0
  210. data/spec/feeds/data/ciarmy-ip-reputation.txt +11 -0
  211. data/spec/feeds/data/cruzit-ip-reputation.txt +14 -0
  212. data/spec/feeds/data/cydef_torexit-ip_reputation.txt +27 -0
  213. data/spec/feeds/data/dan_me_uk_torlist-ip-reputation.txt +11 -0
  214. data/spec/feeds/data/danger_bruteforce-ip_reputation.txt +12 -0
  215. data/spec/feeds/data/dshield_topattackers.xml +4 -0
  216. data/spec/feeds/data/falconcrest_iplist.txt +345 -0
  217. data/spec/feeds/data/feodo_domainlist.txt +18 -0
  218. data/spec/feeds/data/feodo_iplist.txt +20 -0
  219. data/spec/feeds/data/h3x_asprox.txt +20 -0
  220. data/spec/feeds/data/hosts-file_hphostspartial_domainlist.txt +24 -0
  221. data/spec/feeds/data/infiltrated_iplist.txt +16 -0
  222. data/spec/feeds/data/infiltrated_vabl_iplist.txt +33 -0
  223. data/spec/feeds/data/isc_suspicious_high_domainlist.txt +26 -0
  224. data/spec/feeds/data/isc_suspicious_low_domainlist.txt +34 -0
  225. data/spec/feeds/data/isc_suspicious_medium_domainlist.txt +32 -0
  226. data/spec/feeds/data/malc0de_domainlist.txt +18 -0
  227. data/spec/feeds/data/malc0de_iplist.txt +14 -0
  228. data/spec/feeds/data/malwaredomainlist-url-reputation.txt +8 -0
  229. data/spec/feeds/data/malwaredomains_domainlist.txt +24 -0
  230. data/spec/feeds/data/malwaredomains_dyndns_domainlist.txt +34 -0
  231. data/spec/feeds/data/malwaredomains_justdomains_domainlist.txt +18 -0
  232. data/spec/feeds/data/mirc_domainlist.txt +31 -0
  233. data/spec/feeds/data/multiproxy_iplist.txt +15 -0
  234. data/spec/feeds/data/nothink_irc_iplist.txt +14 -0
  235. data/spec/feeds/data/nothink_ssh_iplist.txt +10 -0
  236. data/spec/feeds/data/openbl_iplist.txt +12 -0
  237. data/spec/feeds/data/openphish-url-reputation.txt +16 -0
  238. data/spec/feeds/data/packetmail_perimeterbad-ip_reputation.txt +44 -0
  239. data/spec/feeds/data/palevo_domainlist.txt +25 -0
  240. data/spec/feeds/data/palevo_iplist.txt +24 -0
  241. data/spec/feeds/data/phishtank-sample.json.gz +0 -0
  242. data/spec/feeds/data/sigmaproject_atma.return.gz +0 -0
  243. data/spec/feeds/data/sigmaproject_spyware.return.gz +0 -0
  244. data/spec/feeds/data/sigmaproject_webexploit.return.gz +0 -0
  245. data/spec/feeds/data/snort_bpf-ip_reputation.txt +16 -0
  246. data/spec/feeds/data/spyeye_domainlist.txt +16 -0
  247. data/spec/feeds/data/spyeye_iplist.txt +19 -0
  248. data/spec/feeds/data/steeman-ip-reputation.txt +13 -0
  249. data/spec/feeds/data/t-arend-de_ssh_iplist.txt +17 -0
  250. data/spec/feeds/data/the_haleys_ssh_iplist.txt +12 -0
  251. data/spec/feeds/data/trustedsec-ip-reputation.txt +12 -0
  252. data/spec/feeds/data/valid.json +2908 -0
  253. data/spec/feeds/data/virbl-ip_reputation.txt +14 -0
  254. data/spec/feeds/data/vxvault-url-reputation.txt +15 -0
  255. data/spec/feeds/data/yourcmc_ssh-ip_reputation.txt +27 -0
  256. data/spec/feeds/data/yoyo_adservers.txt +25 -0
  257. data/spec/feeds/data/zeus-ip_reputation.txt +285 -0
  258. data/spec/feeds/data/zeus_domainlist.txt +27 -0
  259. data/spec/feeds/dshield_attackers-top1000_spec.rb +39 -0
  260. data/spec/feeds/falconcrest-ip_reputation_spec.rb +39 -0
  261. data/spec/feeds/feodo-domain_reputation_spec.rb +47 -0
  262. data/spec/feeds/feodo-ip_reputation_spec.rb +47 -0
  263. data/spec/feeds/h3x_asprox-ip_reputation_spec.rb +50 -0
  264. data/spec/feeds/hosts-file_hphostspartial-domain_reputation_spec.rb +47 -0
  265. data/spec/feeds/infiltrated-ip_reputation_spec.rb +47 -0
  266. data/spec/feeds/infiltrated_vabl-ip_reputation_spec.rb +47 -0
  267. data/spec/feeds/isc_suspicious_high-domain_reputation_spec.rb +47 -0
  268. data/spec/feeds/isc_suspicious_low-domain_reputation_spec.rb +47 -0
  269. data/spec/feeds/isc_suspicious_medium-domain_reputation_spec.rb +47 -0
  270. data/spec/feeds/malc0de-domain_reputation_spec.rb +47 -0
  271. data/spec/feeds/malc0de-ip_reputation_spec.rb +47 -0
  272. data/spec/feeds/malwaredomainlist_url_reputation_spec.rb +50 -0
  273. data/spec/feeds/malwaredomains-domain_reputation_spec.rb +47 -0
  274. data/spec/feeds/malwaredomains_dyndns-domain_reputation_spec.rb +47 -0
  275. data/spec/feeds/malwaredomains_justdomains-domain_reputation_spec.rb +47 -0
  276. data/spec/feeds/mirc-domain_reputation_spec.rb +47 -0
  277. data/spec/feeds/multiproxy-ip_reputation_spec.rb +47 -0
  278. data/spec/feeds/nothink_irc-ip_reputation_spec.rb +47 -0
  279. data/spec/feeds/nothink_ssh-ip_reputation_spec.rb +47 -0
  280. data/spec/feeds/openbl-ip_reputation_spec.rb +47 -0
  281. data/spec/feeds/openphish_url_reputation_spec.rb +50 -0
  282. data/spec/feeds/packetmail_perimeterbad-ip_reputation_spec.rb +47 -0
  283. data/spec/feeds/palevo-domain_reputation_spec.rb +47 -0
  284. data/spec/feeds/palevo-ip_reputation_spec.rb +47 -0
  285. data/spec/feeds/phishtank_spec.rb +41 -0
  286. data/spec/feeds/sigmaproject_atma_spec.rb +62 -0
  287. data/spec/feeds/sigmaproject_spyware_spec.rb +63 -0
  288. data/spec/feeds/sigmaproject_webexploit_spec.rb +62 -0
  289. data/spec/feeds/snort_bpf-ip_reputation_spec.rb +47 -0
  290. data/spec/feeds/spyeye-domain_reputation_spec.rb +47 -0
  291. data/spec/feeds/spyeye-ip_reputation_spec.rb +47 -0
  292. data/spec/feeds/steeman-ip_reputation_spec.rb +50 -0
  293. data/spec/feeds/t-arend-de_ssh-ip_reputation_spec.rb +47 -0
  294. data/spec/feeds/the_haleys_ssh-ip_reputation_spec.rb +47 -0
  295. data/spec/feeds/trustedsec-ip_reputation_spec.rb +47 -0
  296. data/spec/feeds/virbl-ip_reputation_spec.rb +47 -0
  297. data/spec/feeds/vxvault_url_reputation_spec.rb +50 -0
  298. data/spec/feeds/yourcmc_ssh-ip_reputation_spec.rb +47 -0
  299. data/spec/feeds/yoyo_adservers_spec.rb +47 -0
  300. data/spec/feeds/zeus-domain_reputation_spec.rb +47 -0
  301. data/spec/feeds/zeus-ip_reputation_spec.rb +47 -0
  302. data/spec/fixtures/feed/provider1/feed1.feed +6 -0
  303. data/spec/fixtures/parsers/test.xml +13 -0
  304. data/spec/fixtures/parsers/test_self_closing.xml +20 -0
  305. data/spec/fixtures/plugins/bad/threatinator/plugins/test_error1/plugin.rb +1 -0
  306. data/spec/fixtures/plugins/bad/threatinator/plugins/test_missing1/plugin.rb +0 -0
  307. data/spec/fixtures/plugins/fake.rb +19 -0
  308. data/spec/fixtures/plugins/good/threatinator/plugins/test_type1/plugin_a.rb +8 -0
  309. data/spec/fixtures/plugins/good/threatinator/plugins/test_type1/plugin_b.rb +8 -0
  310. data/spec/fixtures/plugins/good/threatinator/plugins/test_type2/plugin_c.rb +8 -0
  311. data/spec/fixtures/plugins/good/threatinator/plugins/test_type2/plugin_d.rb +8 -0
  312. data/spec/fixtures/plugins/good/threatinator/plugins/test_type3/plugin_e.rb +8 -0
  313. data/spec/fixtures/plugins/good/threatinator/plugins/test_type3/plugin_f.rb +8 -0
  314. data/spec/spec_helper.rb +54 -0
  315. data/spec/support/bad_feeds/missing_fetcher.feed +7 -0
  316. data/spec/support/bad_feeds/missing_name.feed +6 -0
  317. data/spec/support/bad_feeds/missing_parser.feed +3 -0
  318. data/spec/support/bad_feeds/missing_provider.feed +5 -0
  319. data/spec/support/factories/event.rb +31 -0
  320. data/spec/support/factories/feed.rb +59 -0
  321. data/spec/support/factories/feed_builder.rb +65 -0
  322. data/spec/support/factories/feed_registry.rb +8 -0
  323. data/spec/support/factories/ipv4.rb +36 -0
  324. data/spec/support/factories/output.rb +11 -0
  325. data/spec/support/factories/record.rb +17 -0
  326. data/spec/support/factories/url.rb +34 -0
  327. data/spec/support/factories/xml_node.rb +33 -0
  328. data/spec/support/helpers/io.rb +11 -0
  329. data/spec/support/helpers/models.rb +13 -0
  330. data/spec/support/shared/action_builder.rb +47 -0
  331. data/spec/support/shared/decoder.rb +70 -0
  332. data/spec/support/shared/feed_runner_observer.rb +136 -0
  333. data/spec/support/shared/feeds.rb +233 -0
  334. data/spec/support/shared/fetcher.rb +48 -0
  335. data/spec/support/shared/filter.rb +14 -0
  336. data/spec/support/shared/io-like.rb +7 -0
  337. data/spec/support/shared/model/collection.rb +164 -0
  338. data/spec/support/shared/output.rb +120 -0
  339. data/spec/support/shared/parsers.rb +51 -0
  340. data/spec/support/shared/record.rb +111 -0
  341. data/spec/threatinator/actions/list/action_spec.rb +148 -0
  342. data/spec/threatinator/actions/run/action_spec.rb +106 -0
  343. data/spec/threatinator/actions/run/config_spec.rb +39 -0
  344. data/spec/threatinator/actions/run/coverage_observer_spec.rb +151 -0
  345. data/spec/threatinator/actions/run/output_config_spec.rb +89 -0
  346. data/spec/threatinator/actions/run/status_observer_spec.rb +86 -0
  347. data/spec/threatinator/cli/list_action_builder_spec.rb +57 -0
  348. data/spec/threatinator/cli/run_action_builder_spec.rb +133 -0
  349. data/spec/threatinator/cli_spec.rb +175 -0
  350. data/spec/threatinator/config/base_spec.rb +39 -0
  351. data/spec/threatinator/config/feed_search_spec.rb +76 -0
  352. data/spec/threatinator/decoders/gzip_spec.rb +75 -0
  353. data/spec/threatinator/event_builder_spec.rb +123 -0
  354. data/spec/threatinator/event_spec.rb +254 -0
  355. data/spec/threatinator/event_spec.rb.new +319 -0
  356. data/spec/threatinator/feed_builder_spec.rb +633 -0
  357. data/spec/threatinator/feed_registry_spec.rb +198 -0
  358. data/spec/threatinator/feed_runner_spec.rb +372 -0
  359. data/spec/threatinator/feed_spec.rb +169 -0
  360. data/spec/threatinator/fetcher_spec.rb +12 -0
  361. data/spec/threatinator/fetchers/http_spec.rb +32 -0
  362. data/spec/threatinator/filter_spec.rb +13 -0
  363. data/spec/threatinator/filters/block_spec.rb +16 -0
  364. data/spec/threatinator/filters/comments_spec.rb +13 -0
  365. data/spec/threatinator/filters/whitespace_spec.rb +12 -0
  366. data/spec/threatinator/logger_spec.rb +29 -0
  367. data/spec/threatinator/model/observables/fqdn_collection_spec.rb +41 -0
  368. data/spec/threatinator/model/observables/ipv4_collection_spec.rb +36 -0
  369. data/spec/threatinator/model/observables/ipv4_spec.rb +75 -0
  370. data/spec/threatinator/model/observables/url_collection_spec.rb +45 -0
  371. data/spec/threatinator/model/validations/type_spec.rb +37 -0
  372. data/spec/threatinator/parser_spec.rb +13 -0
  373. data/spec/threatinator/parsers/csv/parser_spec.rb +202 -0
  374. data/spec/threatinator/parsers/getline/parser_spec.rb +83 -0
  375. data/spec/threatinator/parsers/json/parser_spec.rb +106 -0
  376. data/spec/threatinator/parsers/json/record_spec.rb +30 -0
  377. data/spec/threatinator/parsers/xml/node_spec.rb +335 -0
  378. data/spec/threatinator/parsers/xml/parser_spec.rb +263 -0
  379. data/spec/threatinator/parsers/xml/path_spec.rb +209 -0
  380. data/spec/threatinator/parsers/xml/pattern_spec.rb +72 -0
  381. data/spec/threatinator/parsers/xml/record_spec.rb +27 -0
  382. data/spec/threatinator/plugin_loader_spec.rb +238 -0
  383. data/spec/threatinator/plugins/output/csv_spec.rb +47 -0
  384. data/spec/threatinator/plugins/output/null_spec.rb +17 -0
  385. data/spec/threatinator/plugins/output/rubydebug_spec.rb +37 -0
  386. data/spec/threatinator/record_spec.rb +19 -0
  387. data/spec/threatinator/registry_spec.rb +97 -0
  388. data/spec/threatinator/runner_spec.rb +273 -0
  389. metadata +674 -0
@@ -0,0 +1,47 @@
1
+ require 'spec_helper'
2
+
3
+ describe 'feeds/infiltrated-ip_reputation.feed', :feed do
4
+ let(:provider) { 'infiltrated' }
5
+ let(:name) { 'ip_reputation' }
6
+ let(:event_types) { [:scanning]}
7
+
8
+
9
+ it_fetches_url 'http://www.infiltrated.net/blacklisted'
10
+
11
+ describe_parsing_the_file feed_data('infiltrated_iplist.txt') do
12
+ it "should have parsed 14 records" do
13
+ expect(num_records_parsed).to eq(14)
14
+ end
15
+ it "should have filtered 2 records" do
16
+ expect(num_records_filtered).to eq(2)
17
+ end
18
+ end
19
+
20
+ describe_parsing_a_record '95.221.71.219' do
21
+ it "should have parsed" do
22
+ expect(status).to eq(:parsed)
23
+ end
24
+ it "should have parsed 1 event" do
25
+ expect(events.count).to eq(1)
26
+ end
27
+ describe 'event 0' do
28
+ subject { events[0] }
29
+ its(:type) { is_expected.to be(:scanning) }
30
+ its(:ipv4s) { is_expected.to eq(build(:ipv4s, values: ['95.221.71.219'])) }
31
+ end
32
+ end
33
+
34
+ describe_parsing_a_record '94.41.71.52' do
35
+ it "should have parsed" do
36
+ expect(status).to eq(:parsed)
37
+ end
38
+ it "should have parsed 1 event" do
39
+ expect(events.count).to eq(1)
40
+ end
41
+ describe 'event 0' do
42
+ subject { events[0] }
43
+ its(:type) { is_expected.to be(:scanning) }
44
+ its(:ipv4s) { is_expected.to eq(build(:ipv4s, values: ['94.41.71.52'])) }
45
+ end
46
+ end
47
+ end
@@ -0,0 +1,47 @@
1
+ require 'spec_helper'
2
+
3
+ describe 'feeds/infiltrated_vabl-ip_reputation.feed', :feed do
4
+ let(:provider) { 'infiltrated' }
5
+ let(:name) { 'vabl_ip_reputation' }
6
+ let(:event_types) { [:scanning]}
7
+
8
+
9
+ it_fetches_url 'http://www.infiltrated.net/vabl.txt'
10
+
11
+ describe_parsing_the_file feed_data('infiltrated_vabl_iplist.txt') do
12
+ it "should have parsed 21 records" do
13
+ expect(num_records_parsed).to eq(21)
14
+ end
15
+ it "should have filtered 12 records" do
16
+ expect(num_records_filtered).to eq(12)
17
+ end
18
+ end
19
+
20
+ describe_parsing_a_record '108.59.1.205 | BRU | VABL | 20110609 | e22b6e201b3533a0dd1ac8bb47426169 | 30633 | 108.59.0.0/20 | LEASEWEB-US | US | - | LEASEWEB USA INC' do
21
+ it "should have parsed" do
22
+ expect(status).to eq(:parsed)
23
+ end
24
+ it "should have parsed 1 event" do
25
+ expect(events.count).to eq(1)
26
+ end
27
+ describe 'event 0' do
28
+ subject { events[0] }
29
+ its(:type) { is_expected.to be(:scanning) }
30
+ its(:ipv4s) { is_expected.to eq(build(:ipv4s, values: ['108.59.1.205'])) }
31
+ end
32
+ end
33
+
34
+ describe_parsing_a_record '109.169.60.121 | BRU | VABL | 20110621 | 8850509672ee7d983d9a511e31b13a9a | 29761 | 109.169.60.0/23 | OC3-NETWORKS-AS-NUMB | US | BMTRADAGROUP.COM | RAPIDSWITCH LTD' do
35
+ it "should have parsed" do
36
+ expect(status).to eq(:parsed)
37
+ end
38
+ it "should have parsed 1 event" do
39
+ expect(events.count).to eq(1)
40
+ end
41
+ describe 'event 0' do
42
+ subject { events[0] }
43
+ its(:type) { is_expected.to be(:scanning) }
44
+ its(:ipv4s) { is_expected.to eq(build(:ipv4s, values: ['109.169.60.121'])) }
45
+ end
46
+ end
47
+ end
@@ -0,0 +1,47 @@
1
+ require 'spec_helper'
2
+
3
+ describe 'feeds/isc_suspicious_high-domain_reputation.feed', :feed do
4
+ let(:provider) { 'isc' }
5
+ let(:name) { 'suspicious_high_domain_reputation' }
6
+ let(:event_types) { [:scanning]}
7
+
8
+
9
+ it_fetches_url 'https://isc.sans.edu/feeds/suspiciousdomains_High.txt'
10
+
11
+ describe_parsing_the_file feed_data('isc_suspicious_high_domainlist.txt') do
12
+ it "should have parsed 9 records" do
13
+ expect(num_records_parsed).to eq(9)
14
+ end
15
+ it "should have filtered 17 records" do
16
+ expect(num_records_filtered).to eq(17)
17
+ end
18
+ end
19
+
20
+ describe_parsing_a_record '1-verygoods.ru' do
21
+ it "should have parsed" do
22
+ expect(status).to eq(:parsed)
23
+ end
24
+ it "should have parsed 1 event" do
25
+ expect(events.count).to eq(1)
26
+ end
27
+ describe 'event 0' do
28
+ subject { events[0] }
29
+ its(:type) { is_expected.to be(:malware_host) }
30
+ its(:fqdns) { is_expected.to match_array(['1-verygoods.ru']) }
31
+ end
32
+ end
33
+
34
+ describe_parsing_a_record '123kochi.com' do
35
+ it "should have parsed" do
36
+ expect(status).to eq(:parsed)
37
+ end
38
+ it "should have parsed 1 event" do
39
+ expect(events.count).to eq(1)
40
+ end
41
+ describe 'event 0' do
42
+ subject { events[0] }
43
+ its(:type) { is_expected.to be(:malware_host) }
44
+ its(:fqdns) { is_expected.to match_array(['123kochi.com']) }
45
+ end
46
+ end
47
+ end
@@ -0,0 +1,47 @@
1
+ require 'spec_helper'
2
+
3
+ describe 'feeds/isc_suspicious_low-domain_reputation.feed', :feed do
4
+ let(:provider) { 'isc' }
5
+ let(:name) { 'suspicious_low_domain_reputation' }
6
+ let(:event_types) { [:scanning]}
7
+
8
+
9
+ it_fetches_url 'https://isc.sans.edu/feeds/suspiciousdomains_Low.txt'
10
+
11
+ describe_parsing_the_file feed_data('isc_suspicious_low_domainlist.txt') do
12
+ it "should have parsed 17 records" do
13
+ expect(num_records_parsed).to eq(17)
14
+ end
15
+ it "should have filtered 17 records" do
16
+ expect(num_records_filtered).to eq(17)
17
+ end
18
+ end
19
+
20
+ describe_parsing_a_record '10kpictures.com' do
21
+ it "should have parsed" do
22
+ expect(status).to eq(:parsed)
23
+ end
24
+ it "should have parsed 1 event" do
25
+ expect(events.count).to eq(1)
26
+ end
27
+ describe 'event 0' do
28
+ subject { events[0] }
29
+ its(:type) { is_expected.to be(:malware_host) }
30
+ its(:fqdns) { is_expected.to match_array(['10kpictures.com']) }
31
+ end
32
+ end
33
+
34
+ describe_parsing_a_record '1492tapasbar.com' do
35
+ it "should have parsed" do
36
+ expect(status).to eq(:parsed)
37
+ end
38
+ it "should have parsed 1 event" do
39
+ expect(events.count).to eq(1)
40
+ end
41
+ describe 'event 0' do
42
+ subject { events[0] }
43
+ its(:type) { is_expected.to be(:malware_host) }
44
+ its(:fqdns) { is_expected.to match_array(['1492tapasbar.com']) }
45
+ end
46
+ end
47
+ end
@@ -0,0 +1,47 @@
1
+ require 'spec_helper'
2
+
3
+ describe 'feeds/isc_suspicious_medium-domain_reputation.feed', :feed do
4
+ let(:provider) { 'isc' }
5
+ let(:name) { 'suspicious_medium_domain_reputation' }
6
+ let(:event_types) { [:scanning]}
7
+
8
+
9
+ it_fetches_url 'https://isc.sans.edu/feeds/suspiciousdomains_Medium.txt'
10
+
11
+ describe_parsing_the_file feed_data('isc_suspicious_medium_domainlist.txt') do
12
+ it "should have parsed 15 records" do
13
+ expect(num_records_parsed).to eq(15)
14
+ end
15
+ it "should have filtered 17 records" do
16
+ expect(num_records_filtered).to eq(17)
17
+ end
18
+ end
19
+
20
+ describe_parsing_a_record '114oldest.com' do
21
+ it "should have parsed" do
22
+ expect(status).to eq(:parsed)
23
+ end
24
+ it "should have parsed 1 event" do
25
+ expect(events.count).to eq(1)
26
+ end
27
+ describe 'event 0' do
28
+ subject { events[0] }
29
+ its(:type) { is_expected.to be(:malware_host) }
30
+ its(:fqdns) { is_expected.to match_array(['114oldest.com']) }
31
+ end
32
+ end
33
+
34
+ describe_parsing_a_record '168asia.com' do
35
+ it "should have parsed" do
36
+ expect(status).to eq(:parsed)
37
+ end
38
+ it "should have parsed 1 event" do
39
+ expect(events.count).to eq(1)
40
+ end
41
+ describe 'event 0' do
42
+ subject { events[0] }
43
+ its(:type) { is_expected.to be(:malware_host) }
44
+ its(:fqdns) { is_expected.to match_array(['168asia.com']) }
45
+ end
46
+ end
47
+ end
@@ -0,0 +1,47 @@
1
+ require 'spec_helper'
2
+
3
+ describe 'feeds/malc0de-domain_reputation.feed', :feed do
4
+ let(:provider) { 'malc0de' }
5
+ let(:name) { 'domain_reputation' }
6
+ let(:event_types) { [:scanning]}
7
+
8
+
9
+ it_fetches_url 'http://malc0de.com/bl/BOOT'
10
+
11
+ describe_parsing_the_file feed_data('malc0de_domainlist.txt') do
12
+ it "should have parsed 12 records" do
13
+ expect(num_records_parsed).to eq(12)
14
+ end
15
+ it "should have filtered 6 records" do
16
+ expect(num_records_filtered).to eq(6)
17
+ end
18
+ end
19
+
20
+ describe_parsing_a_record 'PRIMARY opencandy.com blockeddomain.hosts' do
21
+ it "should have parsed" do
22
+ expect(status).to eq(:parsed)
23
+ end
24
+ it "should have parsed 1 event" do
25
+ expect(events.count).to eq(1)
26
+ end
27
+ describe 'event 0' do
28
+ subject { events[0] }
29
+ its(:type) { is_expected.to be(:malware_host) }
30
+ its(:fqdns) { is_expected.to match_array(['opencandy.com']) }
31
+ end
32
+ end
33
+
34
+ describe_parsing_a_record 'PRIMARY cachelocal.org blockeddomain.hosts' do
35
+ it "should have parsed" do
36
+ expect(status).to eq(:parsed)
37
+ end
38
+ it "should have parsed 1 event" do
39
+ expect(events.count).to eq(1)
40
+ end
41
+ describe 'event 0' do
42
+ subject { events[0] }
43
+ its(:type) { is_expected.to be(:malware_host) }
44
+ its(:fqdns) { is_expected.to match_array(['cachelocal.org']) }
45
+ end
46
+ end
47
+ end
@@ -0,0 +1,47 @@
1
+ require 'spec_helper'
2
+
3
+ describe 'feeds/malc0de-ip_reputation.feed', :feed do
4
+ let(:provider) { 'malc0de' }
5
+ let(:name) { 'ip_reputation' }
6
+ let(:event_types) { [:scanning]}
7
+
8
+
9
+ it_fetches_url 'http://malc0de.com/bl/IP_Blacklist.txt'
10
+
11
+ describe_parsing_the_file feed_data('malc0de_iplist.txt') do
12
+ it "should have parsed 10 records" do
13
+ expect(num_records_parsed).to eq(10)
14
+ end
15
+ it "should have filtered 4 records" do
16
+ expect(num_records_filtered).to eq(4)
17
+ end
18
+ end
19
+
20
+ describe_parsing_a_record '216.151.164.53' do
21
+ it "should have parsed" do
22
+ expect(status).to eq(:parsed)
23
+ end
24
+ it "should have parsed 1 event" do
25
+ expect(events.count).to eq(1)
26
+ end
27
+ describe 'event 0' do
28
+ subject { events[0] }
29
+ its(:type) { is_expected.to be(:malware_host) }
30
+ its(:ipv4s) { is_expected.to eq(build(:ipv4s, values: ['216.151.164.53'])) }
31
+ end
32
+ end
33
+
34
+ describe_parsing_a_record '176.32.99.47' do
35
+ it "should have parsed" do
36
+ expect(status).to eq(:parsed)
37
+ end
38
+ it "should have parsed 1 event" do
39
+ expect(events.count).to eq(1)
40
+ end
41
+ describe 'event 0' do
42
+ subject { events[0] }
43
+ its(:type) { is_expected.to be(:malware_host) }
44
+ its(:ipv4s) { is_expected.to eq(build(:ipv4s, values: ['176.32.99.47'])) }
45
+ end
46
+ end
47
+ end
@@ -0,0 +1,50 @@
1
+ require 'spec_helper'
2
+
3
+ describe 'feeds/malwaredomainlist-url_reputation.feed', :feed do
4
+ let(:provider) { 'malwaredomainlist' }
5
+ let(:name) { 'url_reputation' }
6
+ let(:event_types) { [:scanning]}
7
+
8
+
9
+ it_fetches_url 'http://www.malwaredomainlist.com/updatescsv.php'
10
+
11
+ describe_parsing_the_file feed_data('malwaredomainlist-url-reputation.txt') do
12
+ it "should have parsed 8 records" do
13
+ expect(num_records_parsed).to eq(8)
14
+ end
15
+ it "should have filtered 0 records" do
16
+ expect(num_records_filtered).to eq(0)
17
+ end
18
+ it "should have missed 0 records" do
19
+ expect(num_records_missed).to eq(0)
20
+ end
21
+ end
22
+
23
+ describe_parsing_a_record '"2014/09/17_10:11","qwe.affairedhonneur.us/depqfie59y","192.99.197.131","-","exploit kit","Ben Bazar / benbazar2011y@mail.com","16276"' do
24
+ it "should have parsed" do
25
+ expect(status).to eq(:parsed)
26
+ end
27
+ it "should have parsed 1 event" do
28
+ expect(events.count).to eq(1)
29
+ end
30
+ describe 'event 0' do
31
+ subject { events[0] }
32
+ its(:type) { is_expected.to be(:malware_host) }
33
+ its(:urls) { is_expected.to eq(build(:urls, values: ['http://qwe.affairedhonneur.us/depqfie59y'])) }
34
+ end
35
+ end
36
+
37
+ describe_parsing_a_record '"2014/10/01_09:30","aveconomic.trailswest.org:15106/haddan_files/stories.php","87.118.127.230","ns2.km33436-26.keymachine.de.","exploit kit","T Fankhauser / artstaff@stjoearts.org","31103"' do
38
+ it "should have parsed" do
39
+ expect(status).to eq(:parsed)
40
+ end
41
+ it "should have parsed 1 event" do
42
+ expect(events.count).to eq(1)
43
+ end
44
+ describe 'event 0' do
45
+ subject { events[0] }
46
+ its(:type) { is_expected.to be(:malware_host) }
47
+ its(:urls) { is_expected.to eq(build(:urls, values: ['http://aveconomic.trailswest.org:15106/haddan_files/stories.php'])) }
48
+ end
49
+ end
50
+ end
@@ -0,0 +1,47 @@
1
+ require 'spec_helper'
2
+
3
+ describe 'feeds/malwaredomains-domain_reputation.feed', :feed do
4
+ let(:provider) { 'malwaredomains' }
5
+ let(:name) { 'domain_reputation' }
6
+ let(:event_types) { [:scanning]}
7
+
8
+
9
+ it_fetches_url 'http://mirror1.malwaredomains.com/files/domains.txt'
10
+
11
+ describe_parsing_the_file feed_data('malwaredomains_domainlist.txt') do
12
+ it "should have parsed 20 records" do
13
+ expect(num_records_parsed).to eq(20)
14
+ end
15
+ it "should have filtered 4 records" do
16
+ expect(num_records_filtered).to eq(4)
17
+ end
18
+ end
19
+
20
+ describe_parsing_a_record ' 20151231 qyrzfhilst.ru attackpage safebrowsing.google.com 20131227 20120308 20110512' do
21
+ it "should have parsed" do
22
+ expect(status).to eq(:parsed)
23
+ end
24
+ it "should have parsed 1 event" do
25
+ expect(events.count).to eq(1)
26
+ end
27
+ describe 'event 0' do
28
+ subject { events[0] }
29
+ its(:type) { is_expected.to be(:malware_host) }
30
+ its(:fqdns) { is_expected.to match_array(['qyrzfhilst.ru']) }
31
+ end
32
+ end
33
+
34
+ describe_parsing_a_record ' 20151231 xc6.in iframe blog.unmaskparasites.com/2009/06/25/hidden-cn-iframes-are-still-prevalent 20131228 20110311 20090830' do
35
+ it "should have parsed" do
36
+ expect(status).to eq(:parsed)
37
+ end
38
+ it "should have parsed 1 event" do
39
+ expect(events.count).to eq(1)
40
+ end
41
+ describe 'event 0' do
42
+ subject { events[0] }
43
+ its(:type) { is_expected.to be(:malware_host) }
44
+ its(:fqdns) { is_expected.to match_array(['xc6.in']) }
45
+ end
46
+ end
47
+ end
@@ -0,0 +1,47 @@
1
+ require 'spec_helper'
2
+
3
+ describe 'feeds/malwaredomains_dyndns-domain_reputation.feed', :feed do
4
+ let(:provider) { 'malwaredomains' }
5
+ let(:name) { 'dyndns_domain_reputation' }
6
+ let(:event_types) { [:scanning]}
7
+
8
+
9
+ it_fetches_url 'http://mirror2.malwaredomains.com/files/dynamic_dns.txt'
10
+
11
+ describe_parsing_the_file feed_data('malwaredomains_dyndns_domainlist.txt') do
12
+ it "should have parsed 19 records" do
13
+ expect(num_records_parsed).to eq(19)
14
+ end
15
+ it "should have filtered 15 records" do
16
+ expect(num_records_filtered).to eq(15)
17
+ end
18
+ end
19
+
20
+ describe_parsing_a_record '1040ezdotcom.com malicious siteinspector.comodo.com/' do
21
+ it "should have parsed" do
22
+ expect(status).to eq(:parsed)
23
+ end
24
+ it "should have parsed 1 event" do
25
+ expect(events.count).to eq(1)
26
+ end
27
+ describe 'event 0' do
28
+ subject { events[0] }
29
+ its(:type) { is_expected.to be(:scanning) }
30
+ its(:fqdns) { is_expected.to match_array(['1040ezdotcom.com']) }
31
+ end
32
+ end
33
+
34
+ describe_parsing_a_record '1stresponderservices.com malicious siteinspector.comodo.com/' do
35
+ it "should have parsed" do
36
+ expect(status).to eq(:parsed)
37
+ end
38
+ it "should have parsed 1 event" do
39
+ expect(events.count).to eq(1)
40
+ end
41
+ describe 'event 0' do
42
+ subject { events[0] }
43
+ its(:type) { is_expected.to be(:scanning) }
44
+ its(:fqdns) { is_expected.to match_array(['1stresponderservices.com']) }
45
+ end
46
+ end
47
+ end
@@ -0,0 +1,47 @@
1
+ require 'spec_helper'
2
+
3
+ describe 'feeds/malwaredomains_justdomains-domain_reputation.feed', :feed do
4
+ let(:provider) { 'malwaredomains' }
5
+ let(:name) { 'justdomains_domain_reputation' }
6
+ let(:event_types) { [:scanning]}
7
+
8
+
9
+ it_fetches_url 'http://mirror3.malwaredomains.com/files/justdomains'
10
+
11
+ describe_parsing_the_file feed_data('malwaredomains_justdomains_domainlist.txt') do
12
+ it "should have parsed 18 records" do
13
+ expect(num_records_parsed).to eq(18)
14
+ end
15
+ it "should have filtered 0 records" do
16
+ expect(num_records_filtered).to eq(0)
17
+ end
18
+ end
19
+
20
+ describe_parsing_a_record 'cg79wo20kl92doowfn01oqpo9mdieowv5tyj.com' do
21
+ it "should have parsed" do
22
+ expect(status).to eq(:parsed)
23
+ end
24
+ it "should have parsed 1 event" do
25
+ expect(events.count).to eq(1)
26
+ end
27
+ describe 'event 0' do
28
+ subject { events[0] }
29
+ its(:type) { is_expected.to be(:malware_host) }
30
+ its(:fqdns) { is_expected.to match_array(["cg79wo20kl92doowfn01oqpo9mdieowv5tyj.com"]) }
31
+ end
32
+ end
33
+
34
+ describe_parsing_a_record 'x6p.in' do
35
+ it "should have parsed" do
36
+ expect(status).to eq(:parsed)
37
+ end
38
+ it "should have parsed 1 event" do
39
+ expect(events.count).to eq(1)
40
+ end
41
+ describe 'event 0' do
42
+ subject { events[0] }
43
+ its(:type) { is_expected.to be(:malware_host) }
44
+ its(:fqdns) { is_expected.to match_array(["x6p.in"]) }
45
+ end
46
+ end
47
+ end
@@ -0,0 +1,47 @@
1
+ require 'spec_helper'
2
+
3
+ describe 'feeds/mirc-domain_reputation.feed', :feed do
4
+ let(:provider) { 'mirc' }
5
+ let(:name) { 'domain_reputation' }
6
+ let(:event_types) { [:scanning]}
7
+
8
+
9
+ it_fetches_url 'http://www.mirc.com/servers.ini'
10
+
11
+ describe_parsing_the_file feed_data('mirc_domainlist.txt') do
12
+ it "should have parsed 13 records" do
13
+ expect(num_records_parsed).to eq(13)
14
+ end
15
+ it "should have filtered 18 records" do
16
+ expect(num_records_filtered).to eq(18)
17
+ end
18
+ end
19
+
20
+ describe_parsing_a_record 'n3=Random US serverSERVER:irc.us.dal.net:6665-6668,7000GROUP:DALnet' do
21
+ it "should have parsed" do
22
+ expect(status).to eq(:parsed)
23
+ end
24
+ it "should have parsed 1 event" do
25
+ expect(events.count).to eq(1)
26
+ end
27
+ describe 'event 0' do
28
+ subject { events[0] }
29
+ its(:type) { is_expected.to be(:c2) }
30
+ its(:fqdns) { is_expected.to match_array(['irc.us.dal.net']) }
31
+ end
32
+ end
33
+
34
+ describe_parsing_a_record 'n7=US, WA, SeattleSERVER:serverbuffet.wa.us.dal.net:6665-6668,7000GROUP:DALnet' do
35
+ it "should have parsed" do
36
+ expect(status).to eq(:parsed)
37
+ end
38
+ it "should have parsed 1 event" do
39
+ expect(events.count).to eq(1)
40
+ end
41
+ describe 'event 0' do
42
+ subject { events[0] }
43
+ its(:type) { is_expected.to be(:c2) }
44
+ its(:fqdns) { is_expected.to match_array(['serverbuffet.wa.us.dal.net']) }
45
+ end
46
+ end
47
+ end
@@ -0,0 +1,47 @@
1
+ require 'spec_helper'
2
+
3
+ describe 'feeds/multiproxy-ip_reputation.feed', :feed do
4
+ let(:provider) { 'multiproxy' }
5
+ let(:name) { 'ip_reputation' }
6
+ let(:event_types) { [:scanning]}
7
+
8
+
9
+ it_fetches_url 'http://multiproxy.org/txt_all/proxy.txt'
10
+
11
+ describe_parsing_the_file feed_data('multiproxy_iplist.txt') do
12
+ it "should have parsed 15 records" do
13
+ expect(num_records_parsed).to eq(15)
14
+ end
15
+ it "should have filtered 0 records" do
16
+ expect(num_records_filtered).to eq(0)
17
+ end
18
+ end
19
+
20
+ describe_parsing_a_record '190.53.89.103:6588' do
21
+ it "should have parsed" do
22
+ expect(status).to eq(:parsed)
23
+ end
24
+ it "should have parsed 1 event" do
25
+ expect(events.count).to eq(1)
26
+ end
27
+ describe 'event 0' do
28
+ subject { events[0] }
29
+ its(:type) { is_expected.to be(:scanning) }
30
+ its(:ipv4s) { is_expected.to eq(build(:ipv4s, values: ['190.53.89.103'])) }
31
+ end
32
+ end
33
+
34
+ describe_parsing_a_record '211.140.151.214:8080' do
35
+ it "should have parsed" do
36
+ expect(status).to eq(:parsed)
37
+ end
38
+ it "should have parsed 1 event" do
39
+ expect(events.count).to eq(1)
40
+ end
41
+ describe 'event 0' do
42
+ subject { events[0] }
43
+ its(:type) { is_expected.to be(:scanning) }
44
+ its(:ipv4s) { is_expected.to eq(build(:ipv4s, values: ['211.140.151.214'])) }
45
+ end
46
+ end
47
+ end
@@ -0,0 +1,47 @@
1
+ require 'spec_helper'
2
+
3
+ describe 'feeds/nothink_irc-ip_reputation.feed', :feed do
4
+ let(:provider) { 'nothink' }
5
+ let(:name) { 'irc_ip_reputation' }
6
+ let(:event_types) { [:scanning]}
7
+
8
+
9
+ it_fetches_url 'http://www.nothink.org/blacklist/blacklist_malware_irc.txt'
10
+
11
+ describe_parsing_the_file feed_data('nothink_irc_iplist.txt') do
12
+ it "should have parsed 11 records" do
13
+ expect(num_records_parsed).to eq(11)
14
+ end
15
+ it "should have filtered 3 records" do
16
+ expect(num_records_filtered).to eq(3)
17
+ end
18
+ end
19
+
20
+ describe_parsing_a_record '189.107.132.113' do
21
+ it "should have parsed" do
22
+ expect(status).to eq(:parsed)
23
+ end
24
+ it "should have parsed 1 event" do
25
+ expect(events.count).to eq(1)
26
+ end
27
+ describe 'event 0' do
28
+ subject { events[0] }
29
+ its(:type) { is_expected.to be(:c2) }
30
+ its(:ipv4s) { is_expected.to eq(build(:ipv4s, values: ['189.107.132.113'])) }
31
+ end
32
+ end
33
+
34
+ describe_parsing_a_record '201.48.61.38' do
35
+ it "should have parsed" do
36
+ expect(status).to eq(:parsed)
37
+ end
38
+ it "should have parsed 1 event" do
39
+ expect(events.count).to eq(1)
40
+ end
41
+ describe 'event 0' do
42
+ subject { events[0] }
43
+ its(:type) { is_expected.to be(:c2) }
44
+ its(:ipv4s) { is_expected.to eq(build(:ipv4s, values: ['201.48.61.38'])) }
45
+ end
46
+ end
47
+ end