Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/scm-probe/scm
Syscall monitoring and auditing tool built using eBPF
https://github.com/scm-probe/scm
ebpf ebpf-exporter golang influxdb security security-audit security-tools
Last synced: about 1 month ago
JSON representation
Syscall monitoring and auditing tool built using eBPF
- Host: GitHub
- URL: https://github.com/scm-probe/scm
- Owner: scm-probe
- Created: 2024-06-19T21:06:10.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2024-07-29T19:46:26.000Z (5 months ago)
- Last Synced: 2024-10-13T19:20:30.704Z (2 months ago)
- Topics: ebpf, ebpf-exporter, golang, influxdb, security, security-audit, security-tools
- Language: Go
- Homepage:
- Size: 329 KB
- Stars: 0
- Watchers: 1
- Forks: 1
- Open Issues: 7
-
Metadata Files:
- Readme: Readme.md
Awesome Lists containing this project
README
## Introduction [WIP]
SCM or system-call-montior is monitoring/auditing tool aimed at tracing system calls by attaching itself to a running application process. Under the hood it utilized the [eBPF technology](https://ebpf.io), which lets the program to directly interact with the kernel. After attaching to a process, it exports the metrics to prometheus, then it is consumed by Grafana to show dashboards and generate insights for the data.
## Aim
- Develop a CLI tool to attach the program to any process
- Make the tool interoperable for both linux and windows kernel
- Make the tool os independant, it should only rely on the underlying kernel to trace the calls
- Develop dashboards to show effective insights
- Develop auditing tool to generate audit reports of syscalls for a period
- Develop warning generation mechanism## Running Locally for Development
- Install libbpf `sudo apt install libbpf-dev` for Debian/Ubuntu and `libbpf-devel` for Fedora
- Install clang `sudo apt install clang` and llvm
- Install Kernel Headers using `sudo apt install linux-headers-$(uname -r)`
- On Debian, you may also need `ln -sf /usr/include/asm-generic/ /usr/include/asm`.
- First generate a system call map for your kernel (Currently supports linux kernels) using `make syscall-table` or `ausyscall $(uname -r) --dump > syscall.csv`
- Run `go get` to install all the required packages
- Run `make generate` to compile the eBPF code to object file and generate go scaffolding
- Provision the monitoring resources using `make provision` and shut them down using `make tear`.
- Run `make build` to compile the app
- Run `sudo ./main -n="name of the process you want to trace"` to run the compiled binary, you can also use `-id=` flag to explicilty provide the process id to track.## Developing Environment
- Go version=1.22.0+
- Linux Kernel=5.7.0+
- [Kernel Config Requirements](https://github.com/iovisor/bcc/blob/master/docs/kernel_config.md) - mostly they are present, but if not, use this to debug## Debug
- Install bpftool for debugging from source. This [blog](https://thegraynode.io/posts/bpftool_introduction/) covers everything.
- `bpftool prog list` to show all bpf programs loaded
- `bpftool map list` to show all BPF maps loaded
- `bpftool map dump ` to display contents of map in json, you can get the id of the map from above list command## Graph Mode
- To graph out system call sequence, pass the `-g=true` to the program, when you exit the program, it will generate a dot file in the `temp` directory.
- Run `make simple-graph` to generate a simple graph svg of the system calls in the temp folder.## Visualizations
![Influx Dashboard](./assets/readme/influx_dashboard.png)
![Graph 1](./assets/readme/zed_3s.svg)
![Graph 2](./assets/readme/zed_10s.svg)These are visualizations for the Zed code editor. The first image shows the dashboard for the editor, the second and third images show the sequence of system calls made by the editor for a window of 3s and 10s respectively.