Skip to content
Incident Response Forensic Framework
Go TypeScript HTML CSS JavaScript
Branch: master
Clone or download

Latest commit

Fetching latest commit…
Cannot retrieve the latest commit at this time.


Type Name Latest commit message Commit time
Failed to load latest commit information.
apiserver version 1.0.4 release Feb 8, 2018
nhr-webui/nhr-ui-v1.4.8/nightHawkV4 version 1.0.4 release Feb 8, 2018
query Added tag API Jan 13, 2018
release version 1.0.4 release Feb 8, 2018
src/nighthawkresponse version 1.0.4 release Feb 8, 2018
uam version 1.0.4 release Feb 8, 2018
worker version 1.0.4 release Feb 8, 2018
.gitignore removing pkg Jan 13, 2018 Update Nov 20, 2019

nightHawk Response

Custom built application for asynchronus forensic data presentation on an Elasticsearch backend.
This application is designed to ingest a Mandiant Redline "collections" file and give flexibility in search/stack and tagging.

The application was born out of the inability to control multiple investigations (or hundreds of endpoints) in a single pane of glass.

To ingest redline audits, we created nightHawkResponse, a fully fledge GOpher application designed to accompany this framework. The source code to the application is available in this repo, a binary has been compiled and is running inside the iso ready to ingest from first boot.

Version 2.0 -ETA March 2020

We are currently developing a new major version and will be releasing this by March 2020. The new version aims to accomplish the following.

  • Docker based installation (with Kubenetes/Cloud/Local deployment guides/configs) (WIP)
  • New UI rewrite in React. Stripped back to do essentials and nothing more. (WIP)
  • Progressive and resumable triage uploading (DONE)
  • Kibana nightHawkResponse Plugin (WIP)
  • Simplified code base with unit tests (WIP)
  • Simplified development environment CI/CD (WIP)

We realised that there were too many moving parts to effectively operate the entire repo, easily manage entities and keep everything up to date. We also belive that the core data that resides in Elastic should be used more effectively by Kibana and so we decided to make this a reality by developing a plugin that does this along side of Kibana's amazing workflow.

Version 1.0.4


  • Version 1.0.4 would work on any Ubuntu x64 OS (we have tested in Ubuntu 16.04LTS)
  • Update Ubuntu to latesth patch
  • Download release/nhr-1.0.4.tar.gz
  • Unarchive nhr-1.0.4.tar.gz
  • Change directory to nhr-1.0.4
  • Change to executable (chmod +x
  • Install dependencies and nightHawk Response packages (sudo ./ install)
    Note: Internet access is required during installation.
  • Initial installation may fail to create Elasticsearch index. If that happens please re-run (sudo ./ install)
  • Verify all the components are running
    ---- sudo systemctl status elasticsearch
    ---- sudo systemctl status kibana
    ---- sudo systemctl status rabbitmq-server
    ---- sudo systemctl status nginx
    ---- sudo systemctl status nighthawk-api
    ---- sudo systemctl status nighthawk-worker
  • You can access it by browsing to https://ipaddress
  • Default username and password is both admin/admin

API documentation to follow in Wiki

01/09/2016: Version 1.0.3

  • User context and user accounts added (login with nighthawk/nighthawk), see wiki article
  • Platform statistics and upload information on websockets added
  • Delete cases, delete endpoints, delete endpoints from cases added
  • Task workflow section on websocket added, see wiki article for guide
  • Comments/Tagging are now expandable objects with highlighting enabled
  • Comments are now alerts on websocket, see wiki for notes
  • Bug in CaseName = Endpoint name resolved
  • Zipped audits from Mac/Windows/Linux resolved
  • Responsive design upgrade features
  • w32system added as audit type


Video Demonstration: nightHawk Response Platform

  1. Single view endpoint forensics (multiple audit types).
  2. Global search.
  3. Timelining.
  4. Stacking.
  5. Tagging.
  6. Interactive process tree view.
  7. Multiple file upload & Named investigations.

nightHawk ISO

To make it straight forward for users of nightHawk, we built an ISO with everything setup ready to go. That means you get the following;

  1. Latest nightHawk source.
  2. CentOS 7 Minimal with core libs needed to operate nightHawk.
  3. Nginx and UWSGI setup in reverse proxy (socketed and optimized), SSL enabled.
  4. Latest Elasticsearch/Kibana (Kibana is exposed and useable if desired).
  5. Sysctrl for all core services.
  6. Logging (rotated) for all core services.
  7. Configurable system settings, a list of these can be found in the /opt/nighthawk/etc/nightHawk.json file.

Starting the system:

Before building your VM with the supplied ISO, take into consideration the following;

  1. CPU/RAM.

Pending: Setup the Elastic service to be dual nodes with 1/4 of the allocated system memory per node. This means if you give it 2GB RAM, each ES node will be 512mb and the system will remain with 1GB to operate.

If you want to set this any different way, ssh into the box and configure your desired way.

  1. HDD.

A minimum of 20GB should be considered. An audit file can be large and therefore its advised you allocate a lot of storage to handle ingesting many collections.

Pending: User based storage setup for large scale instances. If you desire to setup extra partitions, you can do this yourself, a few changes can be made to point the ES data storage to your new partition.


Download ISO: nightHawk v1.0.3

Configure the hardware, mount the ISO into the VM, start the installtion script.

Once complete, in your browser (Chrome/FireFox), goto;

Log into the system with 'nighthawk/nighthawk' - click "goto site" to get into application

If you need to access Kibana, goto;

If you need to SSH into the box, the login details are; admin/nightHawk.

If you want to change the IP address (reflected application wide); /opt/nighthawk/bin/nighthawkctl set-ip <new_ipaddress>

Redline Audit Collection Script can be found in the root of this repo. Use this when using the standalone redline collector as this will return the documents you need to populate nightHawk correctly.


IMPORTANT: Creating audit zip file to upload (Redline stand alone collector):
step_1: Navigate to Sessions\AnalysisSessionX\Audits<ComputerName> where X is analysis number which is 1 for most cases.
step_2: Create zip of folder containing audit files i.e. 20160708085733
step_3: Upload

IMPORTANT: Use exisiting HX audit file (HX collector): FireEye HX audits are an extension ending in .mans. The audit from HX differs from the Redline collector because the .mans that it returns is actually a zip file. This means it can be uploaded directly unlike the Redline audit which you need to follow the instructions above.

Navigate to the "Upload" icon on the nav bar, select an audit .zip (or multiple), a case name (otherwise the system will supply you with one) and submit. If you have used our Redline audit script to build your collection, follow the "Redline Collector" instructions just above.

Once processed, the endpoint will appear in the "Current Investigations" tree node. Under the endpoint you will be presented with all audit types available for that endpoint. The upload feature of this web app spawns pOpen subprocesss that calls the GO application to parse the redline audit and push data into Elasticsearch. There are 2 options for uploading, one is sequential, the other is concurrent.

Please Note: Concurrent uploads are limited to 5 at a time and can be resource intensive, if you have an underpowered machine then restrict usage of this feature to 2-3.


You can click on any row in any table (in response view) to tag that data. Once tagged you can view the comments in the comments view.


There are custom mappings (supplied in git root) and advisory comments on the following;

  1. Parent/Child relationships:

Documents are indexed via the GO app as parent/child relation. This was chosen because it is able to give relatively logical path to view documents, ie. the parent is the endpoint name and the children are audit types. Performing aggregations on a parent/child relational document at scale seems to make sense as well. The stacking framework relies on building parents in an array to then get all child document aggregations for certain audit types.

  1. Sharding:

Elasticsearch setups require tuning and proper design recognition. Sharding is important to understand because of the way we are linking parent/child documents. The child is ALWAYS routed to the parent, it cannot exist on its own. This means consideration must be given to how many shards are resident on the index. From what we understand, it may be wise to choose a setup that encorporates many nodes with single shards. To gain performance out of this kind of setup we are working on shard routed searches.

We are currently working on designing the best possible configuration for fast searching.

  1. Scaling:

This application is designed to scale immensely. From inital design concept, we were able to run it smoothly on a single cpu 2gb ubuntu VM with 3 ES nodes (Macbook Pro), with about 4million+ documents (or 50 endpoints ingested). If going into production, running a setup with 64/128GB RAM and SAS storage, you would be able to maintain a lightning fast response time on document retrival whilst having many analysts working on the application at once.


  1. DataTables mixed processing:

    There are several audit types ingested that are much to large to return all documents to the table. For example, URL history and Registry may return 15k doc's back to the DOM, rendering this would put strain on the client browser. To combat this, we are using ServerSide processing to page through results of certain audit types. This means you can also search over documents in audit type using Elasticsearch in the backend.

  2. Tagging:

    Currently we can tag documents and view those comments. We can update them or change them. The analyst is able to give context such as Date/Analyst Name/Comment to the document.

Dependencies (all preinstalled): django 1.8 python requests

To Do:

Process Handles (in progress).
Time selection sliders for time based generators (in progress).
Context menu for Current/Previous investigations.
Tagging context. The tagging system will integrate in a websocket loop for live comments across analyst panes (in progress).
Application context.
Ability to move endpoints between either context.
Potentially redesign node tree to be investigation date driven.
Selective stacking, currently the root node selector is enabled.
Shard routing searches.
Redline Audit script template.
More extensive integration with AngularJS (in progress).
Responsive design. (in progress).
Administrative control page for configuration of core settings (in progress).

Authors & Notes:

We are always looking for likeminded folks who want to contribute to this project, we are by no means web design guru's, if you think we can do something better please request a pull and if we like it, we will merge.

Daniel Eden & Roshan Maskey


Mandiant Redline devs, AngularJS, Django devs, Angular-DataTables/DataTables, D3 (Bostock), Elasticsearch/, jsTree, qTip, GOlang, Python, Fahad Abdulaal (Logo/Video).


alt tag alt tag alt tag alt tag alt tag alt tag

You can’t perform that action at this time.