initial
This commit is contained in:
3
.gitignore
vendored
Normal file
3
.gitignore
vendored
Normal file
@@ -0,0 +1,3 @@
|
|||||||
|
/target
|
||||||
|
/samples
|
||||||
|
*.test
|
||||||
1114
Cargo.lock
generated
Normal file
1114
Cargo.lock
generated
Normal file
File diff suppressed because it is too large
Load Diff
14
Cargo.toml
Normal file
14
Cargo.toml
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
[package]
|
||||||
|
name = "yamato_event_analyzer"
|
||||||
|
version = "0.1.0"
|
||||||
|
authors = ["akiranishikawa <nishikawa@kagosec.net>"]
|
||||||
|
edition = "2018"
|
||||||
|
|
||||||
|
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
|
||||||
|
|
||||||
|
[dependencies]
|
||||||
|
evtx = { git = "https://github.com/omerbenamram/evtx.git" }
|
||||||
|
quick-xml = {version = "0.17", features = ["serialize"] }
|
||||||
|
serde = { version = "1.0", features = ["derive"] }
|
||||||
|
serde_json = { version = "1.0"}
|
||||||
|
|
||||||
0
config/signature.json
Normal file
0
config/signature.json
Normal file
0
src/detections/application.rs
Normal file
0
src/detections/application.rs
Normal file
4
src/detections/mod.rs
Normal file
4
src/detections/mod.rs
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
pub mod security;
|
||||||
|
pub mod system;
|
||||||
|
pub mod application;
|
||||||
|
|
||||||
58
src/detections/security.rs
Normal file
58
src/detections/security.rs
Normal file
@@ -0,0 +1,58 @@
|
|||||||
|
use std::collections::HashMap;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Special privileges assigned to new logon (possible admin access)
|
||||||
|
//
|
||||||
|
pub fn se_debug_privilege(event_data: HashMap<String, String>,
|
||||||
|
alert_all_admin: i32, total_admin_logons: &mut i32,
|
||||||
|
admin_logons: &mut HashMap<String, HashMap<String, i32>>,
|
||||||
|
multiple_admin_logons: &mut HashMap<String, i32>) {
|
||||||
|
|
||||||
|
match event_data.get("PrivilegeList") {
|
||||||
|
Some(privileage_list) => {
|
||||||
|
match privileage_list.find("SeDebugPrivilege") {
|
||||||
|
Some(data) => {
|
||||||
|
|
||||||
|
// alert_all_adminが有効であれば、標準出力して知らせる
|
||||||
|
// DeepBlueCLIでは必ず0になっていて、基本的には表示されない。
|
||||||
|
if (alert_all_admin == 1) {
|
||||||
|
println!("Logon with SeDebugPrivilege (admin access)");
|
||||||
|
println!("Username:{}", event_data["SubjectUserName"]);
|
||||||
|
println!("Domain:{}", event_data["SubjectDomainName"]);
|
||||||
|
println!("User SID:{}", event_data["SubjectUserSid"]);
|
||||||
|
println!("Domain:{}", event_data["PrivilegeList"]);
|
||||||
|
}
|
||||||
|
|
||||||
|
*total_admin_logons += 1;
|
||||||
|
|
||||||
|
// admin_logons配列にusernameが含まれているか確認
|
||||||
|
match admin_logons.get(&event_data["SubjectUserName"]) {
|
||||||
|
Some(sid) => {
|
||||||
|
// 含まれていれば、マルチユーザが管理者としてログインしているか確認
|
||||||
|
// マルチログオンのデータをセット
|
||||||
|
if (event_data["SubjectUserName"] != event_data["SubjectUserSid"]) { // One username with multiple admin logon SIDs
|
||||||
|
multiple_admin_logons.insert(event_data["SubjectUserName"].to_string(),1);
|
||||||
|
|
||||||
|
let mut count_hash: HashMap<String, i32> = HashMap::new();
|
||||||
|
count_hash.insert(event_data["SubjectUserSid"].to_string(), sid[&event_data["SubjectUserSid"]] + 1);
|
||||||
|
admin_logons.insert(event_data["SubjectUserName"].to_string(), count_hash);
|
||||||
|
}
|
||||||
|
},
|
||||||
|
None => {
|
||||||
|
// admin_logons配列にセットUserNameとSIDとカウンタをセット
|
||||||
|
let mut count_hash: HashMap<String, i32> = HashMap::new();
|
||||||
|
count_hash.insert(event_data["SubjectUserSid"].to_string(), 1);
|
||||||
|
admin_logons.insert(event_data["SubjectUserName"].to_string(), count_hash);
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
None => (),
|
||||||
|
}
|
||||||
|
},
|
||||||
|
None => (),
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
0
src/detections/system.rs
Normal file
0
src/detections/system.rs
Normal file
2
src/lib.rs
Normal file
2
src/lib.rs
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
pub mod models;
|
||||||
|
pub mod detections;
|
||||||
61
src/main.rs
Normal file
61
src/main.rs
Normal file
@@ -0,0 +1,61 @@
|
|||||||
|
extern crate serde;
|
||||||
|
extern crate quick_xml;
|
||||||
|
|
||||||
|
use evtx::EvtxParser;
|
||||||
|
use std::env;
|
||||||
|
use std::process;
|
||||||
|
use std::path::PathBuf;
|
||||||
|
use std::collections::HashMap;
|
||||||
|
use quick_xml::de::{DeError};
|
||||||
|
use yamato_event_analyzer::models::event;
|
||||||
|
use yamato_event_analyzer::detections::security;
|
||||||
|
|
||||||
|
fn main() -> Result<(), DeError> {
|
||||||
|
|
||||||
|
let args: Vec<String> = env::args().collect();
|
||||||
|
let fp: PathBuf;
|
||||||
|
if (args.len() > 1) {
|
||||||
|
fp = PathBuf::from(args[1].to_string());
|
||||||
|
} else {
|
||||||
|
fp = PathBuf::from(format!("./samples/security.evtx"));
|
||||||
|
}
|
||||||
|
|
||||||
|
let alert_all_admin = 0;
|
||||||
|
let mut total_admin_logons = 0;
|
||||||
|
let mut admin_logons: HashMap<String, HashMap<String, i32>> = HashMap::new();
|
||||||
|
let mut multiple_admin_logons: HashMap<String, i32> = HashMap::new();
|
||||||
|
|
||||||
|
let mut parser = match EvtxParser::from_path(fp) {
|
||||||
|
Ok(pointer) => pointer,
|
||||||
|
Err(e) => {
|
||||||
|
eprintln!("{}", e);
|
||||||
|
process::exit(1);
|
||||||
|
},
|
||||||
|
};
|
||||||
|
|
||||||
|
for record in parser.records() {
|
||||||
|
match record {
|
||||||
|
Ok(r) => {
|
||||||
|
let event: event::Evtx = quick_xml::de::from_str(&r.data)?;
|
||||||
|
// ログがSecurity.evtxなら
|
||||||
|
if (event.System.Channel == "Security") {
|
||||||
|
if (event.System.EventID == "4672") {
|
||||||
|
let event_data = event.parse_event_data();
|
||||||
|
security::se_debug_privilege(event_data, alert_all_admin, &mut total_admin_logons,
|
||||||
|
&mut admin_logons, &mut multiple_admin_logons);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
Err(e) => eprintln!("{}", e),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (total_admin_logons > 0) {
|
||||||
|
println!("total_admin_logons:{}", total_admin_logons);
|
||||||
|
println!("admin_logons:{:?}", admin_logons);
|
||||||
|
println!("multiple_admin_logons:{:?}", multiple_admin_logons);
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
99
src/models/event.rs
Normal file
99
src/models/event.rs
Normal file
@@ -0,0 +1,99 @@
|
|||||||
|
extern crate serde;
|
||||||
|
use serde::Deserialize;
|
||||||
|
use std::collections::HashMap;
|
||||||
|
|
||||||
|
#[derive(Debug, Deserialize, PartialEq)]
|
||||||
|
pub struct Data {
|
||||||
|
pub Name: Option<String>,
|
||||||
|
#[serde(rename = "$value")]
|
||||||
|
pub Text: Option<String>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Deserialize, PartialEq)]
|
||||||
|
struct TimeCreated {
|
||||||
|
SystemTime: String,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Deserialize, PartialEq)]
|
||||||
|
struct Execution {
|
||||||
|
ProcessID: i32,
|
||||||
|
ThreadID: i32,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Deserialize, PartialEq)]
|
||||||
|
struct Provider {
|
||||||
|
Name: Option<String>,
|
||||||
|
Guid: Option<String>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Deserialize, PartialEq)]
|
||||||
|
pub struct System {
|
||||||
|
Provider: Provider,
|
||||||
|
pub EventID: String,
|
||||||
|
Version: Option<String>,
|
||||||
|
Level: String,
|
||||||
|
Task: String,
|
||||||
|
Opcode: Option<String>,
|
||||||
|
Keywords: String,
|
||||||
|
TimeCreated: TimeCreated,
|
||||||
|
EventRecordID: String,
|
||||||
|
Correlation: Option<String>,
|
||||||
|
Execution: Option<Execution>,
|
||||||
|
pub Channel: String, // Security, System, Application ...etc
|
||||||
|
Computer: String,
|
||||||
|
Security: String,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Deserialize, PartialEq)]
|
||||||
|
pub struct EventData {
|
||||||
|
pub Data: Option<Vec<Data>>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Deserialize, PartialEq)]
|
||||||
|
pub struct Evtx {
|
||||||
|
pub System: System,
|
||||||
|
pub EventData: Option<EventData>,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Evtx {
|
||||||
|
|
||||||
|
//
|
||||||
|
// 文字列データを取得する
|
||||||
|
//
|
||||||
|
fn get_string(v: &Data) -> String {
|
||||||
|
|
||||||
|
match &v.Text {
|
||||||
|
Some(text) => {
|
||||||
|
return text.to_string();
|
||||||
|
},
|
||||||
|
_ => return "".to_string(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// EventDataをHashMapとして取得する
|
||||||
|
//
|
||||||
|
pub fn parse_event_data(self) -> HashMap<String,String> {
|
||||||
|
let mut values = HashMap::new();
|
||||||
|
|
||||||
|
match self.EventData {
|
||||||
|
Some(event_data) =>
|
||||||
|
match event_data.Data {
|
||||||
|
Some(data) => {
|
||||||
|
for v in data.iter() {
|
||||||
|
match &v.Name {
|
||||||
|
Some(name) => {
|
||||||
|
values.insert(name.to_string(), Evtx::get_string(v));
|
||||||
|
},
|
||||||
|
None => (),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
None => (),
|
||||||
|
},
|
||||||
|
None => (),
|
||||||
|
}
|
||||||
|
|
||||||
|
values
|
||||||
|
}
|
||||||
|
}
|
||||||
1
src/models/mod.rs
Normal file
1
src/models/mod.rs
Normal file
@@ -0,0 +1 @@
|
|||||||
|
pub mod event;
|
||||||
Reference in New Issue
Block a user