博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
My Favorite Open Source Security Tools
阅读量:2433 次
发布时间:2019-05-10

本文共 3344 字,大约阅读时间需要 11 分钟。

So working at  it is no surprise I believe in and use a lot of open source software. I think especially for security this makes sense, for a number of reasons:

  • We need tools we can trust, so transparency is key
  • We need tools we can modify, since we often need things that don’t exist
  • We need tools that are cross platform

And the list goes on. I try to support these projects, with code, with feedback, with use, and sometimes, with praise. So, in sort of a weird security  here are a few of my favorite open source security tools:

Ok, #realtalk: This is an open source version of /’s MIR incident response platform. The idea is systems have an agent that reports to a server. The server can then set up jobs to look across an individual system, a group, or an entire population for a specific indicator of compromise, individual file, or many other forensic artifacts.

Given the expense of MIR or similar systems like Encase Enterprise it’s truly astonishing the amount of effort the Google team working on GRR has put in, and it’s a huge benefit to the community that they’ve released it. You can find more information on their  and  site. ~~As a side note I made a fork on GitHub to encourage even more open source collaboration.~~ Google has even moved GRR development to GitHub:. I’m really interested in talking to folks who want to work on this.

So if GRR is an open source version of MIR then Moloch is an open source version of EMC/RSA/Netwitness’s  full content monitoring tool. Put together by the fine folks at AOL Moloch helps you capture and hunt in network traffic.

Oh the fine folks from Etsy & Facebook gave us a gift. MIDAS, the Mac Intrusion Detection Analysis System, is a framework for building host level detection of compromises specifically for OSX. It allows building complex detection routines in Python, then provides the structure to run, store, and report on them. I’ve done a bit of work with this and see amazing potential long term.

So this project hasn’t gotten a lot of love lately, but it’s hugely interesting to me. There aren’t a lot of tools that try to make it easier to collaborate on forensic investigations, in fact most seem hell bent on the exact opposite. I’d love to see more work on this tool, and will be setting it up at home soon.

So you know that time you have to go investigate a nasty web page? There are plenty of options: fire up a virtual machine, try to use a stripped down browser, curl the site. All of these give away some amount of information that you’re profiling, and may miss things. Thug seeks to fix this, by providing a safe (not a real web browser) method that still correctly emulates what a browser would look like (such as an IE7 user agent string instead of a curl user agent string). Thug makes it safe, easy, and quick to do this type of analysis.

Cuckoo Sandbox is easily one of the most mature open source security tools available, and the team behind it should be applauded for that. A malware analysis system, Cuckoo runs malware through a VM, captures system changes, web traffic, and other malware relevant activity and shares it with the analyst. Having just gone  they’ve added tons of features, improved stability, and put this tool on par with more expensive commercial malware systems. If you work with Windows based malware, this system should be in your arsenal.

转载地址:http://yxmmb.baihongyu.com/

你可能感兴趣的文章
ubuntu12.04安装openCV2.4.6.1
查看>>
jsp与servlet的作用以及区别--为什么说JSP底层就是一个Servlet
查看>>
看HashMap源码前的必备冷知识,白话文式教学,适合刚开始了解源码的新手观看
查看>>
Oracle安装指南
查看>>
Redis面试必备(一)
查看>>
Cookie对象入门详解
查看>>
HashMap的remove()方法详解
查看>>
单例模式-分解步骤,逐步解析
查看>>
通过Form表单一次性拿到json格式数据,及后台接收
查看>>
## EL表达式与JSTL标签用法解读
查看>>
Mybatis异常:The content of elements must consist of well-formed.......(一般出现在写分页/带大于小于号的SQL)
查看>>
Mybatis光速入门(配置文件模块)
查看>>
关于Oracle的主键自增如何设置
查看>>
手撕HashMap的resize()方法源码渗透解析+图解
查看>>
Mybatis常见异常类型Could not set parameters for mapping离不开这个原因!
查看>>
Thymeleaf中一个页面怎么嵌套另一个页面,关于页面嵌套,标签告诉你应该知道的
查看>>
JAVA如何实现短信验证码--阿里云接口,新手式图文教学,个人项目有这一篇就够了
查看>>
Java中大小数BigDecimal的加减乘除用法及场景的详细介绍,看完不信你还会报Syntax error on token “+/-/*“, invalid AssignmentOperat异常
查看>>
UVa 10917 Dijkstra
查看>>
CF403B/CF402D
查看>>