mirror of
https://github.com/telekom-security/tpotce.git
synced 2025-04-20 06:02:24 +00:00
remove listbot sources
This commit is contained in:
parent
f2880ec3d6
commit
70f75d51ee
2 changed files with 0 additions and 159 deletions
32
docker/elk/logstash/dist/gen_cve_map.sh
vendored
32
docker/elk/logstash/dist/gen_cve_map.sh
vendored
|
@ -1,32 +0,0 @@
|
|||
#!/bin/bash
|
||||
myURL="https://rules.emergingthreats.net/open/suricata-4.0/rules/sid-msg.map"
|
||||
myRULESFILE="sid-msg.map"
|
||||
myCVEMAP="cve.yaml"
|
||||
|
||||
# Clear cve map
|
||||
rm $myCVEMAP
|
||||
|
||||
# Download SID map from ET if server offers newer file
|
||||
wget -N $myURL
|
||||
myRULESCOUNT=$(wc -l < $myRULESFILE)
|
||||
|
||||
# Just extract rules with CVE ID, for proper matching we also need SID
|
||||
let i=0
|
||||
let j=0
|
||||
while read -r myRULE
|
||||
do
|
||||
(( ++i ))
|
||||
echo -ne "Processing rules, please be patient ($i / $myRULESCOUNT)\r"
|
||||
myCVE=$(echo $myRULE | grep -o -E "(cve,|CVE-|CAN-)([0-9]{4}-([0-9]{4}|[0-9]{5}))" | tr a-z A-Z | tr ",|-" " " | awk '{ print $1"-"$2"-"$3 }')
|
||||
if [ "$myCVE" != "" ]
|
||||
then
|
||||
mySID=$(echo $myRULE | awk '{ print $1 }')
|
||||
echo \"$mySID\": \"$myCVE\" >> $myCVEMAP
|
||||
(( ++j ))
|
||||
fi
|
||||
done < "$myRULESFILE"
|
||||
echo
|
||||
echo "Done. $j CVE IDs have been mapped."
|
||||
|
||||
# Clean up
|
||||
rm $myRULESFILE
|
127
docker/elk/logstash/dist/gen_iprep_map.sh
vendored
127
docker/elk/logstash/dist/gen_iprep_map.sh
vendored
|
@ -1,127 +0,0 @@
|
|||
#!/bin/bash
|
||||
myIPREPMAP="iprep.yaml"
|
||||
myRED="[0;31m"
|
||||
myGREEN="[0;32m"
|
||||
myBLUE="[0;34m"
|
||||
myWHITE="[0;0m"
|
||||
|
||||
# Prepare for new files
|
||||
rm -rf *.raw *.yaml.tmp iprep.yaml
|
||||
|
||||
### Define repeating commands as functions
|
||||
# Download only if host is up, file is newer and follow redirects
|
||||
fuCURL () {
|
||||
local myFILE=$1
|
||||
local myURL=$2
|
||||
local myHOST=$(echo $2 | cut -d "/" -f3)
|
||||
|
||||
echo -n "[ Now checking host ] [$myBLUE $myHOST $myWHITE] "
|
||||
curl --connect-timeout 5 -IsS $myHOST 2>&1>/dev/null
|
||||
if [ $? -eq 0 ];
|
||||
then
|
||||
echo "[$myGREEN OK $myWHITE]"
|
||||
echo -n "[ Now downloading ] [$myBLUE $myURL $myWHITE] "
|
||||
curl -fLso $myFILE -z $myFILE $myURL
|
||||
if [ $? -eq 0 ];
|
||||
then
|
||||
echo "[$myGREEN OK $myWHITE]"
|
||||
else
|
||||
echo "[$myRED ERROR $myWHITE]"
|
||||
fi
|
||||
else
|
||||
echo "[$myRED ERROR $myWHITE]"
|
||||
fi
|
||||
}
|
||||
|
||||
# Only match lines with CIDR addresses, unzip if necessary
|
||||
# Duplicates will be eliminated for the final translation map!
|
||||
fuMATCHCIDR () {
|
||||
local myFILE=$1
|
||||
|
||||
if [ -f $myFILE ];
|
||||
then
|
||||
myZIP=$(file $myFILE | grep -c "Zip")
|
||||
if [ "$myZIP" == "1" ]
|
||||
then
|
||||
unzip -p $myFILE | grep -o -P "^\b(?:\d{1,3}\.){3}\d{1,3}/\d{1,2}\b" | xargs -I '{}' prips '{}'
|
||||
else
|
||||
grep -o -P "^\b(?:\d{1,3}\.){3}\d{1,3}/\d{1,2}\b" $myFILE | xargs -I '{}' prips '{}'
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
||||
# Only match lines with IPv4 addresses, unzip if necessary
|
||||
# Duplicates will be eliminated for the final translation map!
|
||||
fuMATCHIP () {
|
||||
local myFILE=$1
|
||||
|
||||
if [ -f $myFILE ];
|
||||
then
|
||||
myZIP=$(file $myFILE | grep -c "Zip")
|
||||
if [ "$myZIP" == "1" ]
|
||||
then
|
||||
unzip -p $myFILE | grep -o -P "^\b(?:\d{1,3}\.){3}\d{1,3}\b"
|
||||
else
|
||||
grep -o -P "^\b(?:\d{1,3}\.){3}\d{1,3}\b" $myFILE
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
||||
### Define download function
|
||||
fuDOWNLOAD () {
|
||||
local myURL=$1
|
||||
local myTAG=$2
|
||||
local myTMPFILE="$3.tmp"
|
||||
local myYAMLFILE="$3.raw"
|
||||
|
||||
fuCURL $myTMPFILE $myURL
|
||||
fuMATCHCIDR $myTMPFILE | awk '{ print "\""$1"\": \"" "'"$myTAG"'" "\"" }' > $myYAMLFILE
|
||||
fuMATCHIP $myTMPFILE | awk '{ print "\""$1"\": \"" "'"$myTAG"'" "\"" }' >> $myYAMLFILE
|
||||
mySIZE=$(wc -l < $myYAMLFILE)
|
||||
if [ "$mySIZE" != "0" ]
|
||||
then
|
||||
echo "[ Control output ] [$myBLUE $(head -n 1 $myYAMLFILE) $myWHITE]"
|
||||
else
|
||||
echo "[ Control output ] [$myRED EMPTY FILE $myWHITE]"
|
||||
fi
|
||||
}
|
||||
|
||||
# Download reputation lists
|
||||
fuDOWNLOAD "https://reputation.alienvault.com/reputation.generic" "bad reputation" "alienvault"
|
||||
fuDOWNLOAD "https://www.badips.com/get/list/any/2" "known attacker" "badips"
|
||||
fuDOWNLOAD "http://osint.bambenekconsulting.com/feeds/c2-ipmasterlist.txt" "C2 server" "bambenek"
|
||||
fuDOWNLOAD "https://lists.blocklist.de/lists/all.txt" "known attacker" "blocklist"
|
||||
fuDOWNLOAD "https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/botscout_1d.ipset" "form spammer" "firehol_botscout"
|
||||
fuDOWNLOAD "https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/cruzit_web_attacks.ipset" "known attacker" "firehol_cruzit"
|
||||
fuDOWNLOAD "https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/malwaredomainlist.ipset" "known atttacker" "firehol_mwdomainlist"
|
||||
fuDOWNLOAD "https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/proxylists_1d.ipset" "anonymizer" "firehol_proxylists"
|
||||
fuDOWNLOAD "https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/proxyrss_1d.ipset" "anonymizer" "firehol_proxyrss"
|
||||
fuDOWNLOAD "https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/proxyspy_1d.ipset" "anonymizer" "firehol_proxyspy"
|
||||
fuDOWNLOAD "https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/ri_web_proxies_30d.ipset" "anonymizer" "firehol_web_proxies"
|
||||
fuDOWNLOAD "https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/socks_proxy_7d.ipset" "anonymizer" "firehol_socks_proxy"
|
||||
fuDOWNLOAD "https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/sslproxies_1d.ipset" "anonymizer" "firehol_sslproxies"
|
||||
fuDOWNLOAD "http://danger.rulez.sk/projects/bruteforceblocker/blist.php" "known attacker" "rulez"
|
||||
fuDOWNLOAD "http://cinsscore.com/list/ci-badguys.txt" "known attacker" "cinsscore"
|
||||
fuDOWNLOAD "https://rules.emergingthreats.net/open/suricata/rules/compromised-ips.txt" "compromised" "et_compromised"
|
||||
fuDOWNLOAD "http://blocklist.greensnow.co/greensnow.txt" "known attacker" "greensnow"
|
||||
fuDOWNLOAD "http://www.nothink.org/blacklist/blacklist_malware_irc.txt" "malware" "nothink"
|
||||
fuDOWNLOAD "http://cybersweat.shop/iprep/iprep_ramnode.txt" "known attacker" "cybersweat"
|
||||
fuDOWNLOAD "http://spys.me/proxy.txt" "anonymizer" "spys"
|
||||
fuDOWNLOAD "http://ransomwaretracker.abuse.ch/downloads/RW_IPBL.txt" "ransomware" "ransomwaretracker"
|
||||
fuDOWNLOAD "https://report.cs.rutgers.edu/DROP/attackers" "known attacker" "rutgers"
|
||||
fuDOWNLOAD "http://sblam.com/blacklist.txt" "form spammer" "sblam"
|
||||
fuDOWNLOAD "https://sslbl.abuse.ch/blacklist/sslipblacklist.csv" "C2 server" "sslbl"
|
||||
fuDOWNLOAD "http://www.talosintelligence.com/feeds/ip-filter.blf" "bad reputation" "talos"
|
||||
fuDOWNLOAD "https://check.torproject.org/cgi-bin/TorBulkExitList.py?ip=1.1.1.1" "tor exit node" "torexit"
|
||||
fuDOWNLOAD "https://torstatus.blutmagie.de/ip_list_all.php/Tor_ip_list_ALL.csv" "tor exit node" "torip"
|
||||
fuDOWNLOAD "https://www.turris.cz/greylist-data/greylist-latest.csv" "bad reputation" "turris"
|
||||
fuDOWNLOAD "https://zeustracker.abuse.ch/blocklist.php?download=badips" "malware" "zeustracker"
|
||||
fuDOWNLOAD "https://raw.githubusercontent.com/stamparm/maltrail/master/trails/static/mass_scanner.txt" "mass scanner" "maltrail_mass_scanner"
|
||||
fuDOWNLOAD "https://myip.ms/files/blacklist/general/full_blacklist_database.zip" "bot, crawler" "myip"
|
||||
|
||||
# Generate logstash translation map for ip reputation lookup
|
||||
echo -n "[ Building translation map ] "
|
||||
cat *.raw > $myIPREPMAP.tmp
|
||||
# Remove duplicates
|
||||
sort -u $myIPREPMAP.tmp > $myIPREPMAP
|
||||
echo "[$myGREEN DONE $myWHITE]"
|
Loading…
Reference in a new issue