Laika is an object scanner and intrusion detection system that strives to achieve the following goals:
- Scalable
- Work across multiple systems
- High volume of input from many sources
- Flexible
- Modular architecture
- Highly configurable dispatching and dispositioning logic
- Tactical code insertion (without needing restart)
- Verbose
- Generate more metadata than you know what to do with
Each scan does three main actions on each object:
-
Explode children
Some objects are archives, some are wrappers, and others are obfuscators. Whatever the case may be, find children objects that should be scanned recursively by exploding them out.
-
Mark flags
Flags provide a means for dispositioning objects and for pivoting on future analysis.
-
Add metadata
Discover as much information describing the object for future analysis.
Whitepaper can be found @ http://lockheedmartin.com/us/what-we-do/information-technology/cybersecurity/laika-boss.html
Laika is composed of the following pieces:
-
Framework (laika.py)
This is the core of Laika BOSS. It includes the object model and the dispatching logic.
-
laikad
This piece contains the code for running Laika as a deamonized, networked service using the ZeroMQ broker.
-
cloudscan
A command-line client for sending a local system file to a running service instance of Laika (laikad).
-
modules
The scan itself is composed of the running of modules. Each module is its own program that focuses on a particular sub-component of the overall file analysis.
Laika BOSS has been tested on the latest versions of CentOS and Ubuntu LTS
- Install framework dependencies:
- # apt-get install yara python-yara python-progressbar
- # pip install interruptingcow
- Install network client and server dependencies:
- # apt-get install libzmq3 python-zmq python-gevent python-pexpect
- Install module dependencies:
- # apt-get install python-ipy python-m2crypto python-pefile python-pyclamd liblzma5 libimage-exiftool-perl python-msgpack libfuzzy-dev python-cffi python-dev unrar
- # pip install fluent-logger olefile ssdeep py-unrar2 pylzma
- # wget https://github.com/smarnach/pyexiftool/archive/master.zip
- # unzip master.zip
- # cd pyexiftool-master
- # python setup.py build
- # python setup.py install
We recommend using installing jq to parse Laika output.
From the directory containing the framework code, you may run the standalone scanner, laika.py against any file you choose. If you move this file from this directory you'll have to specify various config locations. By default it uses the configurations in the ./etc directory.
$ ./laika.py ~/test_files/testfile.cws.swf | jq '.scan_result[] | { "file type" : .fileType, "flags" : .flags, "md5" : .objectHash }'
100%[############################################] Processed: 1/1 total files (Elapsed Time: 0:00:00) Time: 0:00:00
{
"md5": "dffcc2464911077d8ecd352f3d611ecc",
"flags": [],
"file type": [
"cws",
"swf"
]
}
{
"md5": "587c8ac651011bc23ecefecd4c253cd4",
"flags": [],
"file type": [
"fws",
"swf"
]
}
$ ./laikad.py
$ ./cloudscan.py ~/test_files/testfile.cws.swf | jq '.scan_result[] | { "file type" : .fileType, "flags" : .flags, "md5" : .objectHash }'
{
"md5": "dffcc2464911077d8ecd352f3d611ecc",
"flags": [],
"file type": [
"cws",
"swf"
]
}
{
"md5": "587c8ac651011bc23ecefecd4c253cd4",
"flags": [],
"file type": [
"fws",
"swf"
]
}
The Laika framework and associated modules are released under the terms of the Apache 2.0 license.