Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/rjbhide/wireshark-forensics-plugin
https://github.com/rjbhide/wireshark-forensics-plugin
Last synced: 3 months ago
JSON representation
- Host: GitHub
- URL: https://github.com/rjbhide/wireshark-forensics-plugin
- Owner: rjbhide
- Created: 2021-07-30T15:03:59.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2021-11-10T08:44:23.000Z (almost 3 years ago)
- Last Synced: 2024-05-20T12:35:45.726Z (6 months ago)
- Language: Lua
- Size: 6.78 MB
- Stars: 89
- Watchers: 8
- Forks: 19
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - rjbhide/wireshark-forensics-plugin - (Lua)
README
# wireshark-forensics-plugin
Wireshark is the most widely used network traffic analyzer. It is an important tool for both live traffic analysis & forensic analysis for forensic/malware analysts. Even though Wireshark provides incredibly powerful functionalities for protocol parsing & filtering, it does not provide any contextual information about network endpoints. For a typical analyst, who has to comb through GBs of PCAP files to identify malicious activity, it's like finding a needle in a haystack.Wireshark Forensics Toolkit is a cross-platform Wireshark plugin that correlates network traffic data with threat intelligence, asset categorization & vulnerability data to speed up network forensic analysis. It does it by extending Wireshark native search filter functionality to allow filtering based on these additional contextual attributes. It works with both PCAP files and real-time traffic captures.
This toolkit provides the following functionality
- Loads malicious Indicators CSV exported from Threat Intelligence Platforms like MISP and associates it with each source/destination IP from network traffic
- Loads asset classification information based on IP-Range to Asset Type mapping which enables filtering incoming/outgoing traffic from a specific type of assets (e.g. filter for ‘Database Server’, ‘Employee Laptop’ etc)
- Loads exported vulnerability scan information exported from Qualys/Nessus map IP to CVEs.
- Extends native Wireshark filter functionality to allow filtering based severity, source, asset type & CVE information for each source or destination IP address in network logs# How To Use
1. Download source Zip file or checkout the code
2. Folder data/formatted_reports has 3 files
* asset_tags.csv : Information about asset ip/domain/cidr and associated tags. Default file has few examples for intranet IPs & DNS servers
* asset_vulnerabilities.csv : Details about CVE IDs and top CVSS score value for each asset
* indicators.csv : IOC data with attributes type, value, severity & threat type
3. All 3 files mentioned in step (2) can either be manually edited or vulnerabilities & indicators file can be generated using exported MISP & Tenable Nessus scan report. Need to place exported files under following folders with exact name specified
- data/raw_reports/misp.csv : this file can be exported from MISP from following location, Export->CSV_Sig->Generate then Download![image](https://user-images.githubusercontent.com/12109344/141029639-d755edf0-4467-4a80-aae3-089b5e4ab175.png)
- data/raw_reports/nessus.csv : this file can be exported from tenable nessus interface. Goto Scans->Scan Results->Select latest full scan entry. Select Vulnerability Detail List from Dropdown.
![image](https://user-images.githubusercontent.com/12109344/141030328-7940caef-21b3-41d3-b3de-86647f5ba424.png)
Then goto Options->Export as CSV->Select All->Submit. Rename downloaded file as nessus.csv and copy it to raw_reports/nessus.csv
5. If you planning to download data from ThreatStream instead of using MISP, provide username, api_key and filter in config.json file. Each time you run python script, it will try to grab latest IOCs from threatstream & store them in data/formatted_reports/indicators.csv file.4. Run wft.exe if you are on windows, else run 'python wft.py' on Mac or Ubuntu to install and/or replace updated report files. Script will automatically pick up Wireshark Install location. If you have installed wireshark on custom path or using Wireshark Portable App then you can provide location as command line argument. E.g. while using Portable App, location would look something like this 'C:\Downloads\WiresharkPortable\Data\'
5. Post Installation, Open Wireshark & go to Edit->Configuration Profiles and select wireshark forensic toolkit profile. This will enable all additional columns
![image](https://user-images.githubusercontent.com/12109344/141031264-20beb1bf-8749-45a8-b67c-0a370e9f6e11.png)6. Now relaunch Wireshark either open a PCAP file or start a live capture. In search filter you can use additional filtering parameters each starting with 'wft'. Wireshark will show dropdown for all filtering parameters available. Note all these additional filtering parameters are available for both source & destinations IP/Domain values.
![image](https://user-images.githubusercontent.com/12109344/141077419-a70840c8-c827-4cdc-a32a-f17ffbddfd03.png)
# List of filters available
Note all these options also available for destination, just replace 'wft.src' with 'wft.dst'
- wft.src.domain (Source Domain Resolution using previous DNS traffic)
- wft.src.detection (Source IP/Domain detection using IOC data)
- wft.src.severity (Source IP/Domain detection severity using IOC data)
- wft.src.threat_type (Source IP/Domain threat type severity using IOC data)
- wft.src.tags (Source IP/Domain asset tags)
- wft.src.os (Source IP/Domain operating system specified in vulnerability report)
- wft.src.cve_ids (Comma separated list of CVE IDS for source IP/Domain)
- wft.src.top_cvss_score (Top CVSS score among all CVE IDs for a given host)# LICENSE: [![License: CC BY-NC-SA 4.0](https://licensebuttons.net/l/by-nc-sa/4.0/80x15.png)](https://creativecommons.org/licenses/by-nc-sa/4.0/)
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.