Module: FIDIUS::EvasionDB::SnortRuleFetcher
- Defined in:
- lib/evasion-db/rule_fetchers/snort/lib/snort.rb
Constant Summary collapse
- @@rule_path =
nil
- @@ssh_host =
nil
- @@ssh_pw =
nil
- @@ssh_remote_path =
nil
- @@ssh_user =
nil
- @@fetch_remote =
false
- @@ssh_options =
{}
Class Method Summary collapse
Instance Method Summary collapse
- #config(conf) ⇒ Object
-
#fetch_rules(attack_module) ⇒ Object
generate a bitvector based on activated rules and assign this bisvector to the given attack_module.
-
#import_rules ⇒ Object
fetches rules with snortor and stores them all into db.
- #import_rules_to_snortor ⇒ Object
Class Method Details
.ssh_options=(a) ⇒ Object
95 96 97 |
# File 'lib/evasion-db/rule_fetchers/snort/lib/snort.rb', line 95 def self.(a) @@ssh_options = a end |
Instance Method Details
#config(conf) ⇒ Object
81 82 83 84 85 86 87 88 89 90 91 92 93 |
# File 'lib/evasion-db/rule_fetchers/snort/lib/snort.rb', line 81 def config(conf) return unless conf conf = conf["snort-fetcher"] return unless conf.class == Hash @@rule_path = conf["rule_path"]#"/home/bernd/fidius/snort/rules/fetched" @@ssh_host = conf["ssh_host"] #"10.10.10.254" @@ssh_pw = conf["ssh_pw"]#"fidius09" @@ssh_remote_path = conf["ssh_remote_path"] #"/etc/snort/rules/" @@ssh_user = conf["ssh_user"] #"fidius" @@fetch_remote = @@ssh_host != nil end |
#fetch_rules(attack_module) ⇒ Object
generate a bitvector based on activated rules and assign this bisvector to the given attack_module
34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 |
# File 'lib/evasion-db/rule_fetchers/snort/lib/snort.rb', line 34 def fetch_rules(attack_module) import_rules_to_snortor raise "this attack_module has an ruleset bitvector" if attack_module.enabled_rules start_time = Time.now rules_enabled = BitField.new(Snortor.rules.size) i = 0 Snortor.rules.each do |rule| if rule. rules_enabled[i] = (rule.active == true)? 1 : 0 i += 1 end end end_time = Time.now ruleset = FIDIUS::EvasionDB::Knowledge::EnabledRules.create(:bitstring=>rules_enabled.to_s) ruleset.attack_module = attack_module ruleset.save end |
#import_rules ⇒ Object
fetches rules with snortor and stores them all into db
57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 |
# File 'lib/evasion-db/rule_fetchers/snort/lib/snort.rb', line 57 def import_rules raise "rules imported already" if FIDIUS::EvasionDB::Knowledge::IdsRule.all.size > 0 import_rules_to_snortor i = 0 insert_query = [] Snortor.rules.each do |rule| if rule. insert_query << FIDIUS::EvasionDB::Knowledge::IdsRule.sub_query_for_insert(rule.,i) i += 1 end end begin FIDIUS::EvasionDB::Knowledge::IdsRule.connection.execute("INSERT IGNORE INTO ids_rules (rule_text,rule_hash,sort) VALUES #{insert_query.join(',')};") rescue begin # try without IGNORE statement FIDIUS::EvasionDB::Knowledge::IdsRule.connection.execute("INSERT INTO ids_rules (rule_text,rule_hash,sort) VALUES #{insert_query.join(',')};") rescue puts $!.+":"+$!.backtrace.to_s end end end |
#import_rules_to_snortor ⇒ Object
22 23 24 25 26 27 28 29 30 31 |
# File 'lib/evasion-db/rule_fetchers/snort/lib/snort.rb', line 22 def import_rules_to_snortor raise "no rulepath given" unless @@rule_path if @@fetch_remote a = {:host=>@@ssh_host,:user=>@@ssh_user,:password=>@@ssh_pw,:remote_path=>@@ssh_remote_path,:options=>@@ssh_options} puts "Snortor.import_rules(#{a.inspect})" Snortor.import_rules(a) else Snortor.import_rules(@@rule_path) end end |