-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add IVRE module #1354
base: master
Are you sure you want to change the base?
Add IVRE module #1354
Conversation
@bcoles Thanks for your review. I think it should be better now. |
945be00
to
37b1291
Compare
Codecov Report
@@ Coverage Diff @@
## master #1354 +/- ##
==========================================
- Coverage 53.34% 53.23% -0.11%
==========================================
Files 483 484 +1
Lines 40745 40883 +138
==========================================
+ Hits 21737 21766 +29
- Misses 19008 19117 +109
Continue to review full report at Codecov.
|
import hashlib | ||
|
||
from netaddr import IPNetwork | ||
from ivre.db import db, DBPassive |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Any way this could be done using pure REST instead of relying on another library?
# | ||
# Created: 2021-09-14 | ||
# Copyright: (c) Pierre Lalet | ||
# Licence: GPL |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please change to MIT.
yield dbase.searchhostname(name) | ||
|
||
|
||
EVENTS_FILTERS = { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Any particular reason why this approach was taken? It's quite different to all the other modules.
IVRE is an open-source network recon framework.
It has several use-cases, such as running your own Shodan-like service (based on powerful open-source tools such as Masscan, Nmap, ZGrab2, ZDns), passively gather intelligence from network traffic (including running a Passive DNS service, collecting and analyzing X509 certificates, HTTP headers, TCP banners, etc.), analyzing scanners hits against simple honeypots, etc.
It already integrates well with YETI, Cortex and OpenCTI.
See for some examples: https://doc.ivre.rocks/en/latest/usage/use-cases.html.