Skip to content

kunai-project/kunai

Repository files navigation

CI Downloads Discord

GitHub release (with filter) Documentation GitHub Latest Release Documentation

Leitmotiv

The goal behind this project is to bring relevant events to achieve various monitoring tasks ranging from security monitoring to Threat Hunting on Linux based systems. If you are familiar with Sysmon on Windows, you can think of Kunai as being a Sysmon equivalent for Linux.

What makes Kunai special ?

  • events arrive sorted in chronological order
  • benefits from on-host correlation and events enrichment
  • works well with Linux namespaces and container technologies (you can trace all the activity happening inside your containers)

How it works

All the kernel components of this project are running as eBPF programs (also called probes). Kunai embeds numbers of probes to monitor relevant information for security monitoring. When the job is done on eBPF side, information is passed on to a userland program which is responsible for various things, such as re-ordering, enriching and correlating events.

On the implementation side, Kunai is written for its majority in Rust, leveraging the awesome Aya library so everything you'll need to run is a standalone binary embedding both all the eBPF probes and the userland program.

FAQ

  • Is it compatible with my OS/Kernel ? : Check out the compatibility page
  • What kind of events can I get ? : Please take a read to events documentation
  • Which version should I use ?: If it is just to test the tool, use the latest build as it is always the best in terms of features and bug fix. However keep in mind that events in "non stable" version are subject to change.

How to build the project ?

Before going further, I have to remind you that there is a distribution agnostic (built with musl) pre-compiled version of kunai available in release page. So if you just want to give a try to kunai, you probably don't need to build the project yourself.

The project is a little bit tricky to build as it uses cutting edge Aya and bpf-linker features. In order to provide a unique binary you can run on any kernel kunai uses BPF CO-RE, which requires bpf-linker to support Debugging Information to generate proper BTF information. To compile bpf-linker you will need also to compile a custom version of LLVM, which includes some specific patches. Please do not run away now, because we have made this process very easy.

Requirements

Before being able to build everything, you need to install a couple of tools.

  • to build many Rust projects (this one included), you need rustup
  • to build bpf-linker/LLVM need: cmake, ninja, git, clang, lld
  • to build kunai you need: clang, libbpf-dev

Example of commands to install requirements on Ubuntu/Debian:

sudo apt update
sudo apt install -y cmake ninja-build clang lld git libbpf-dev

Building build-tools

Now the only thing you need is to run a command and brew a coffee because the first LLVM compilation takes time.

cargo xtask build-tools

After a little while, you get the custom bpf-linker installed in build-tools directory within kunai's root directory. Please note that this step absolutely does not remove any prior bpf-linker installation made with cargo install bpf-linker.

NB: do not delete the build-tools directory, unless you want to compile bpf-linker/LLVM again from scratch.

Building kunai

Once you have the build-tools ready, you don't need to build them again. You can now build the project with xtask, a cargo command (specific to this project) to make your life easier.

Building debug version

cargo xtask build
# find your executable in: ./target/x86_64-unknown-linux-musl/debug/kunai

Building release version (harder, better, faster, stronger)

cargo xtask build --release
# find your executable in: ./target/x86_64-unknown-linux-musl/release/kunai

Cross-compiling

Let's say you want to cross-compile Kunai for aarch64 using MUSL, so that you have a single static binary at the end.

  1. Install the proper target using rustup rustup install target aarch64-unknown-linux-musl
  2. You need to install an appropriate toolchain to cross-compile to your target on your distribution. When building to a MUSL target, it may work using lld as linker and it works for aarch64-unknown-linux-musl target.
  3. Specify the target you want to build for in the command line and specify the linker to use.
    cargo xtask build --release --target aarch64-unknown-linux-musl --linker /usr/bin/lld
    
    If using lld does not work, you need to find the appropriate linker to use when cross-compiling to the wanted target. Please dig a bit on the internet for that as I don't know them all, and it also depends on your distribution.
  4. You should find your cross-compiled binary at ./target/aarch64-unknown-linux-musl/release/kunai

NB: specifying --linker option is just a shortcut for setting appropriate RUSTFLAGS env variable when building userland application.

Related Work

Sysmon For Linux: https://github.com/Sysinternals/SysmonForLinux

Acknowledgements

  • Thanks to all the people behind Aya, this stuff is just awesome
  • Special thanks to @alessandrod and @vadorovsky
  • Thanks to all the usual guys always supporting my crazy ideas

Funding

The NGSOTI project is dedicated to training the next generation of Security Operation Center (SOC) operators, focusing on the human aspect of cybersecurity. It underscores the significance of providing SOC operators with the necessary skills and open-source tools to address challenges such as detection engineering, incident response, and threat intelligence analysis. Involving key partners such as CIRCL, Restena, Tenzir, and the University of Luxembourg, the project aims to establish a real operational infrastructure for practical training. This initiative integrates academic curricula with industry insights, offering hands-on experience in cyber ranges.

NGSOTI is co-funded under Digital Europe Programme (DEP) via the ECCC (European cybersecurity competence network and competence centre).