Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add filesystem source #34

Closed
rshipp opened this issue Jul 30, 2018 · 7 comments
Closed

Add filesystem source #34

rshipp opened this issue Jul 30, 2018 · 7 comments
Labels
enhancement New feature or general improvement source idea Idea for a new Source plugin
Milestone

Comments

@rshipp
Copy link
Contributor

rshipp commented Jul 30, 2018

Point it at a file/directory and it will recursively read and extract artifacts similar to iocextract CLI.

@rshipp rshipp added the enhancement New feature or general improvement label Jul 30, 2018
@rshipp rshipp added the source idea Idea for a new Source plugin label Aug 6, 2018
@deadbits
Copy link

Maybe consider using watchdog to monitor for changes to that directory automatically and extract artifacts from any newly added files:

@rshipp
Copy link
Contributor Author

rshipp commented Aug 28, 2018

Interesting. I'm not sure if this will work here, I need something that doesn't run continuously and just gives me a flag or something I can check to see if there have been changes (mtime maybe?). I haven't thought too far into it.

@deadbits
Copy link

I personally think continuous monitoring (or even periodically per day/hour) of a path could be great.

My use case premise was something like: Analysts put APT reports in a given directory or share drive, Threat Ingestors uses watchdog (or similar) to watch path, analyst of T.I. adds that directory as a source and all newly added reports have their artifacts automatically extracted.

Potentially on the user's pipeline they could just feed the results into an alerting list for IPS, hashes, or add YARA sigs to their internal ruleset application.

@rshipp
Copy link
Contributor Author

rshipp commented Aug 29, 2018

The problem with continuous is just that ThreatIngestor isn't a persistent process, it's meant to run quickly once every X minutes / hours.

One workaround might be creating an SQS worker that uses watchdog, and adds a job to the queue if it notices a change. Then ThreatIngestor can just watch the queue and run on the files when it sees a new job.

@deadbits
Copy link

Ahh gotcha 👍 i misunderstood

@rshipp
Copy link
Contributor Author

rshipp commented Feb 11, 2019

This is now possible due to #52. @needmorecowbell has a SQS worker using watchdog locally. Need to add docs on SQS workflow (#17) and figure out how we're going to publish the "SQS worker" concept/examples... maybe wait until #40 is done too so it's not tied to SQS specifically.

@rshipp rshipp added this to the 1.0.0 milestone Mar 6, 2019
@rshipp
Copy link
Contributor Author

rshipp commented Mar 12, 2019

@rshipp rshipp closed this as completed Mar 12, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or general improvement source idea Idea for a new Source plugin
Projects
None yet
Development

No branches or pull requests

2 participants