Giter Club home page Giter Club logo

lorenzo-papa / loganalysisbeta Goto Github PK

View Code? Open in Web Editor NEW
2.0 1.0 2.0 48.1 MB

LogAnalysisTool: provide a new approach for pattern attack search and for calculation of severity of logins in Linux's Wtmp, Btmp and Secure log. Searched patterns: Brute Force, Password Spraying. Also check of IPWhois and Reputation. Plus utility functions.

Python 100.00%
linux security security-tools digital forensic-analysis wtmp btmp secure-log auth-log severity-analysis

loganalysisbeta's Introduction

LogAnalysisBeta

Welcome! With LogAnalysisTool it is possible to perform forensic analysis of Wtmp, Btmp and Secure log (auth.log) files. Specifically, sessions and access attempts to the system are extracted, to detect the presence of eventual attack patterns (Brute Force or Spray) and the related (eventual) malicious logins. Moreover, it is possible to search from public sources details about the attacking IPs and/or possible IPs of interest. Finally, it ispossible to search by keywords or by time filters within (non-binary) files.

pwd PDF: cybersecurity

Commands:

  • {grep,rgrep,time,rtime,single_ip_search,multiple_ip_search,binary_parse,login_search,secure_log_search}

Analysis:

  • Through the <binary_parse> command it is possible to analyze Wtmp and Btmp files individually. Specifically, in the first case all the system sessions will be extracted, while in the second case the system access attempts will be searched to identify attack patterns (Brute Force and Spray) and statistical information about these attempts. The search for information about the attacking IPs will be performed automatically.
  • Through the <login_search> command it is possible to analyze a couple of Wtmp and Btmp files. All the system sessions and all system access attempts will be searched in order to identify attack patterns (Brute Force and Spray), statistical information about these attempts and malicious logins. The search for information about the attacking IPs will be performed automatically.
  • Through the <secure_log_search> command it is possible to analyze auth.log (or secure) files. All the system sessions and all system access attempts will be searched in order to identify attack patterns (Brute Force and Spray), statistical information about these attempts and malicious logins. The search for information about the attacking IPs will be performed automatically.

Utility:

  • The <grep> command is used to find keywords within a single readable (non-binary) file. It performs a line-by-line check and extracts only those lines that match the requested pattern.
  • The <rgrep> command is used to find keywords within readable (non-binary) files in a directory. It performs a line-by-line check and extracts only those lines that match the requested pattern.
  • The <time> command is used to filter logs within a single readable (non-binary) file through a requested time interval. It performs a line-by-line check and extracts only those lines that match the requested pattern.By default the is the locatime of the machine on which the execution is invoked
  • The <rtime> command is used to filter logs within readable (non-binary) files in a directory through a requested time interval. It performs a line-by-line check and extracts only those lines that match the requested pattern.By default the is the locatime of the machine on which the execution is invoked
  • The <single_ip_search> command is used to get informations of a single IP address: IP geolocalization, public info (Description, CN, ASN, etc), reputation, open ports and CVE vulnerabilities. It uses IP2Geotools, AbuseIPDB and Shodan.
  • The <multiple_ip_search> command is used to get informations of multiple IP addresses: IP geolocalization, public info (Description, CN, ASN, etc), reputation, open ports and CVE vulnerabilities. It uses IP2Geotools, AbuseIPDB and Shodan. Due to the possible large amount of IPs requested, it presents the output data in a different format than the single-ip-search.

Hope you will enjoy it! :)

loganalysisbeta's People

Contributors

lorenzo-papa avatar

Stargazers

 avatar  avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.