Skip to content

Commit 7409d01

Browse files
authored
Merge pull request #459 from stratosphereips/develop
Slips v1.0.11
2 parents dd5606a + 78366c8 commit 7409d01

File tree

90 files changed

+7442
-5641
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

90 files changed

+7442
-5641
lines changed

CHANGELOG.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,13 @@
1+
- 1.0.11 (February 2024)
2+
- Improve the logging of evidence in alerts.json and alerts.log.
3+
- Optimize the storing of evidence in the Redis database.
4+
- Fix problem of missing evidence, now all evidence is logged correctly.
5+
- Fix problem adding flows to incorrect time windows.
6+
- Fix problem setting SSH version changing evidence.
7+
- Fix problem closing Redis ports using -k.
8+
- Fix problem closing the progress bar.
9+
- Fix problem releasing the terminal when Slips is done.
10+
111
- 1.0.10 (January 2024)
212
- Faster ensembling of evidence.
313
- Log accumulated threat levels of each evidence in alerts.json.

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
<h1 align="center">
2-
Slips v1.0.10
2+
Slips v1.0.11
33
</h1>
44

55

@@ -125,7 +125,7 @@ or our command-line based interface Kalipso
125125

126126
##### Web interface
127127

128-
./webinteface.sh
128+
./webinterface.sh
129129

130130
Then navigate to ```http://localhost:55000/``` from your browser.
131131

VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.0.10
1+
1.0.11

config/slips.conf

Lines changed: 19 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -345,24 +345,25 @@ receive_delay = 86400
345345
# All the following detections are turned on by default
346346
# Turn them off by adding any of the following detections to the disabled_detections list
347347

348-
# ARPScan, ARP-outside-localnet, UnsolicitedARP, MITM-ARP-attack, SSHSuccessful,
349-
# LongConnection, MultipleReconnectionAttempts,
350-
# ConnectionToMultiplePorts, InvalidCertificate, UnknownPort, Port0Connection,
351-
# ConnectionWithoutDNS, DNSWithoutConnection,
352-
# MaliciousJA3, DataExfiltration, SelfSignedCertificate, VerticalPortscan,
353-
# HorizontalPortscan, Password_Guessing, MaliciousFlow,
354-
# SuspiciousUserAgent, multiple_google_connections, NETWORK_gps_location_leaked,
355-
# Command-and-Control-channels-detection, InvalidCertificate
356-
# ThreatIntelligenceBlacklistDomain, ThreatIntelligenceBlacklistIP,
357-
# ThreatIntelligenceBlacklistedASN, MaliciousDownloadedFile,
358-
# DGA, MaliciousSSLCert, YoungDomain, MultipleSSHVersions
359-
# DNS-ARPA-Scan, SMTPLoginBruteforce, BadSMTPLogin,
360-
# IncompatibleUserAgent, ICMP-Timestamp-Scan, ICMP-AddressScan, ICMP-AddressMaskScan
361-
# EmptyConnections, IncompatibleCN, PastebinDownload, ExecutableMIMEType
362-
# MultipleUserAgent, DifferentLocalnet, ConnectionToPrivateIP, HTTPtraffic
363-
# InvalidDNSResolution
364-
365-
# disabled_detections = [ConnectionToMultiplePorts, PortScanType1]
348+
# ARP_SCAN, ARP_OUTSIDE_LOCALNET, UNSOLICITED_ARP, MITM_ARP_ATTACK,
349+
# YOUNG_DOMAIN, MULTIPLE_SSH_VERSIONS, DIFFERENT_LOCALNET,
350+
# DEVICE_CHANGING_IP, NON_HTTP_PORT_80_CONNECTION, NON_SSL_PORT_443_CONNECTION,
351+
# WEIRD_HTTP_METHOD, INCOMPATIBLE_CN, DGA_NXDOMAINS, DNS_WITHOUT_CONNECTION,
352+
# PASTEBIN_DOWNLOAD, CONNECTION_WITHOUT_DNS, DNS_ARPA_SCAN, UNKNOWN_PORT,
353+
# PASSWORD_GUESSING, HORIZONTAL_PORT_SCAN, CONNECTION_TO_PRIVATE_IP, GRE_TUNNEL,
354+
# VERTICAL_PORT_SCAN, SSH_SUCCESSFUL, LONG_CONNECTION, SELF_SIGNED_CERTIFICATE,
355+
# MULTIPLE_RECONNECTION_ATTEMPTS, CONNECTION_TO_MULTIPLE_PORTS, HIGH_ENTROPY_DNS_ANSWER,
356+
# INVALID_DNS_RESOLUTION, PORT_0_CONNECTION, MALICIOUS_JA3, MALICIOUS_JA3S,
357+
# DATA_UPLOAD, BAD_SMTP_LOGIN, SMTP_LOGIN_BRUTEFORCE, MALICIOUS_SSL_CERT,
358+
# MALICIOUS_FLOW, SUSPICIOUS_USER_AGENT, EMPTY_CONNECTIONS, INCOMPATIBLE_USER_AGENT,
359+
# EXECUTABLE_MIME_TYPE, MULTIPLE_USER_AGENT, HTTP_TRAFFIC, MALICIOUS_JARM,
360+
# NETWORK_GPS_LOCATION_LEAKED, ICMP_TIMESTAMP_SCAN, ICMP_ADDRESS_SCAN,
361+
# ICMP_ADDRESS_MASK_SCAN, DHCP_SCAN, MALICIOUS_IP_FROM_P2P_NETWORK, P2P_REPORT,
362+
# COMMAND_AND_CONTROL_CHANNEL, THREAT_INTELLIGENCE_BLACKLISTED_ASN,
363+
# THREAT_INTELLIGENCE_BLACKLISTED_IP, THREAT_INTELLIGENCE_BLACKLISTED_DOMAIN,
364+
# MALICIOUS_DOWNLOADED_FILE, MALICIOUS_URL
365+
366+
# disabled_detections = [THREAT_INTELLIGENCE_BLACKLISTED_IP, CONNECTION_TO_PRIVATE_IP]
366367
disabled_detections = []
367368

368369
####################

conftest.py

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,26 +21,29 @@
2121

2222

2323
@pytest.fixture
24-
def mock_rdb():
24+
def mock_db():
2525
# Create a mock version of the database object
2626
with patch('slips_files.core.database.database_manager.DBManager') as mock:
2727
yield mock.return_value
2828

2929
def do_nothing(*arg):
30-
"""Used to override the print function because using the self.print causes broken pipes"""
30+
"""Used to override the print function because using the self.print causes
31+
broken pipes"""
3132
pass
3233

3334
@pytest.fixture
3435
def input_queue():
35-
"""This input_queue will be passed to all module constructors that need it"""
36+
"""This input_queue will be passed to all module constructors that need
37+
it"""
3638
input_queue = Queue()
3739
input_queue.put = do_nothing
3840
return input_queue
3941

4042

4143
@pytest.fixture
4244
def profiler_queue():
43-
"""This profiler_queue will be passed to all module constructors that need it"""
45+
"""This profiler_queue will be passed to all module constructors that need
46+
it"""
4447
profiler_queue = Queue()
4548
profiler_queue.put = do_nothing
4649
return profiler_queue

dataset/test14-malicious-zeek-dir/http.log

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -515,3 +515,7 @@
515515
{"ts":256.462234,"uid":"C6pigI2xhEcRM11ul5","id.orig_h":"10.0.2.15","id.orig_p":49422,"id.resp_h":"147.32.80.7","id.resp_p":80,"trans_depth":7,"method":"GET","host":"147.32.80.7","uri":"/wpad.dat","version":"1.1","request_body_len":0,"response_body_len":593,"status_code":200,"status_msg":"OK","tags":[],"resp_fuids":["F9fIvwQnkVDaTbP3b"],"resp_mime_types":["text/plain"]}
516516
{"ts":256.472445,"uid":"ClMSbZVMEHMJrIUFg","id.orig_h":"10.0.2.15","id.orig_p":49421,"id.resp_h":"147.32.80.7","id.resp_p":80,"trans_depth":7,"method":"GET","host":"147.32.80.7","uri":"/wpad.dat","version":"1.1","request_body_len":0,"response_body_len":593,"status_code":200,"status_msg":"OK","tags":[],"resp_fuids":["FdmOWS7AXNlR2iaya"],"resp_mime_types":["text/plain"]}
517517
{"ts":256.550217,"uid":"C6ISUE3ZtRgrPYiTd","id.orig_h":"10.0.2.15","id.orig_p":49465,"id.resp_h":"54.239.168.175","id.resp_p":80,"trans_depth":1,"method":"GET","host":"x.ss2.us","uri":"/x.cer","version":"1.1","user_agent":"Microsoft-CryptoAPI/6.1","request_body_len":0,"response_body_len":1302,"status_code":200,"status_msg":"OK","tags":[],"resp_fuids":["FzV4Kl11UtKFOqcLf4"]}
518+
{"ts":256.550218,"uid":"CMbXf021RgZlvixHhd","id.orig_h":"10.0.2.15","id.orig_p":45760,"id.resp_h":"142.250.200.238","id.resp_p":80,"trans_depth":1,"method":"GET","host":"google.com","uri":"/","version":"1.1","user_agent":"Wget/1.21.2","request_body_len":0,"response_body_len":219,"status_code":301,"status_msg":"Moved Permanently","tags":[],"resp_fuids":["Faa9ZB2vezZSLlpr9l"],"resp_mime_types":["text/html"]}
519+
{"ts":256.550290,"uid":"CE2oyw2vkIR1JETHOb","id.orig_h":"10.0.2.15","id.orig_p":44476,"id.resp_h":"142.250.200.228","id.resp_p":80,"trans_depth":1,"method":"GET","host":"www.google.com","uri":"/","version":"1.1","user_agent":"Wget/1.21.2","request_body_len":0,"response_body_len":20626,"status_code":200,"status_msg":"OK","tags":[],"resp_fuids":["FjQHUY3rnpA1s8PsEa"],"resp_mime_types":["text/html"]}
520+
{"ts":256.550291,"uid":"CE2oyw2vkIR1JETHOb","id.orig_h":"10.0.2.15","id.orig_p":44476,"id.resp_h":"142.250.200.228","id.resp_p":80,"trans_depth":1,"method":"GET","host":"google.com","uri":"/","version":"1.1","user_agent":"Wget/1.21.2","request_body_len":0,"response_body_len":20626,"status_code":200,"status_msg":"OK","tags":[],"resp_fuids":["FjQHUY3rnpA1s8PsEa"],"resp_mime_types":["text/html"]}
521+
{"ts":256.550295,"uid":"C9wOvkjAJynTX6uVi","id.orig_h":"10.0.2.15","id.orig_p":45770,"id.resp_h":"142.250.200.238","id.resp_p":80,"trans_depth":1,"method":"GET","host":"google.com","uri":"/","version":"1.1","user_agent":"Wget/1.21.2","request_body_len":0,"response_body_len":219,"status_code":301,"status_msg":"Moved Permanently","tags":[],"resp_fuids":["FG8Tka4NxZUyOunZuc"],"resp_mime_types":["text/html"]}

0 commit comments

Comments
 (0)