Advertisement
opexxx

gen_blocklist.py

Jun 4th, 2014
306
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 5.42 KB | None | 0 0
  1. #!/usr/bin/python
  2. # Copyright 2013 Conix Security
  3. #
  4. # This program is free software: you can redistribute it and/or modify
  5. # it under the terms of the GNU General Public License as published by
  6. # the Free Software Foundation, either version 3 of the License, or
  7. # (at your option) any later version.
  8. #
  9. # This program is distributed in the hope that it will be useful,
  10. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  12. # GNU General Public License for more details.
  13. #
  14. # You should have received a copy of the GNU General Public License
  15. # along with this program.  If not, see <http://www.gnu.org/licenses/>.
  16. import socket
  17. import os
  18. import sys
  19. import os.path
  20.  
  21. #############################################
  22. #       Load configuration
  23. try:
  24.     import conf
  25. except ImportError:
  26.     print >> sys.stderr, "[!] Error importing conf.py."
  27.     print >> sys.stderr, "[ ] You can create your configuration file from the default one:"
  28.     print >> sys.stderr, "[ ] $ cp conf.py.sample conf.py && vim conf.py"
  29.     sys.exit(1)
  30.  
  31. try:
  32.     OUT_FILE = conf.OUT_FILE
  33. except:
  34.     OUT_FILE = "blacklisted-domains.rules"
  35. try:
  36.     IN_FILE = conf.IN_FILE
  37. except:
  38.     IN_FILE = "blacklist.txt"
  39. try:
  40.     SID_LOG_FILE = conf.SID_LOG_FILE
  41. except:
  42.     SID_LOG_FILE = ".sid_log_file"
  43. try:
  44.     SSH_DEPLOY = conf.SSH_DEPLOY
  45. except:
  46.     SSH_DEPLOY = False
  47. try:
  48.     SSH_SERVERS = conf.SSH_SERVERS
  49. except:
  50.     SSH_SERVERS = ()
  51.  
  52. #############################################
  53. #       SSH Deployement requirement
  54. if SSH_DEPLOY:
  55.     try:
  56.         import paramiko
  57.     except ImportError:
  58.         print >> sys.stderr, "[!] Error importing Paramiko library."
  59.         print >> sys.stderr, "[ ] Install it with <pip install paramiko>"
  60.         print >> sys.stderr, "[-] Disabling SSH rules deployment"
  61.         SSH_DEPLOY = False
  62.  
  63. #############################################
  64. #       Latest SID
  65. print "[+] Getting SID"
  66. # get last SID    
  67. try:
  68.     with open(SID_LOG_FILE, "r") as f_sid_log_file:
  69.         line = f_sid_log_file.readline()
  70.         sid = int(line)
  71. except:
  72.     sid = 1510000
  73.     print >> sys.stderr, "[-] <%s> not found, starting SID from 1510000"%SID_LOG_FILE
  74.  
  75. #############################################
  76. #       Generating Rules
  77. rules = ""
  78. sid += 1
  79. print "[+] Generating rules"
  80. try:
  81.     with open(IN_FILE, "r") as f_domains:
  82.         rules = ""
  83.         for fqdn in f_domains:
  84.             pos = fqdn.find("#")
  85.             if pos != -1:
  86.                 fqdn = fqdn[:pos]
  87.            
  88.             fqdn = fqdn.strip()
  89.            
  90.             if fqdn == "":
  91.                 continue
  92.             try:
  93.                 ip_addr = socket.gethostbyname(fqdn)
  94.             except:
  95.                 ip_addr = None
  96.  
  97.             if ip_addr != None:
  98.                 print "[ ] "+fqdn+" :: "+ip_addr
  99.                 rules += 'alert udp $HOME_NET any -> '+ip_addr+' any (msg:"SPAM Campaign UDP Communication FOR '+ip_addr+' ('+fqdn+')"; classtype:trojan-activity; sid:'+str(sid)+'; rev:1; metadata:impact_flag red;)\n'
  100.                 sid += 1
  101.                 rules += 'alert tcp $HOME_NET any -> '+ip_addr+' any (msg:"SPAM Campaign TCP Communication FOR '+ip_addr+' ('+fqdn+')"; classtype:trojan-activity; sid:'+str(sid)+'; rev:1; metadata:impact_flag red;)\n'
  102.                 sid += 1
  103.             else:
  104.                 print >> sys.stderr, "[-] %s :: ip address not resolved"%fqdn
  105.            
  106.             members = fqdn.split(".")
  107.             dns_request = ""
  108.             for m in members:
  109.                 dns_request = dns_request+"|"+str(len(m))+"|"+m
  110.             rules += 'alert udp $HOME_NET any -> any 53 (msg:"SPAM Campaign DNS REQUEST FOR '+fqdn+' UDP"; content:"|01 00 00 01 00 00 00 00 00 00|"; depth:20; offset: 2; content:"'+dns_request+'"; fast_pattern:only; nocase; classtype:trojan-activity; sid:'+str(sid)+'; rev:1; metadata:impact_flag red;)"\n'
  111.             sid += 1
  112. except:
  113.     print >> sys.stderr, "[!] Cannot read <%s>"%IN_FILE
  114.     sys.exit(1)
  115.  
  116. #############################################
  117. #       Writing Rules
  118. print "[+] Writing file"
  119. try:
  120.     with open(OUT_FILE, "a") as f_rules:
  121.         f_rules.write(rules)
  122.     print "[ ] File written"
  123. except:
  124.     print "[!] Cannot write <%s>"%OUT_FILE
  125.     sys.exit(1)
  126.  
  127. if SSH_DEPLOY:
  128.     print "[+] SSH deployment"
  129.     for server in SSH_SERVERS:
  130.         ssh_server      = server[0]
  131.         ssh_port        = server[1]
  132.         ssh_user        = server[2]
  133.         ssh_password    = server[3]
  134.         ssh_remote_path = os.path.join(server[4], os.path.basename(OUT_FILE))
  135.         try:
  136.             client = paramiko.SSHClient()
  137.             client.load_system_host_keys()
  138.             client.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  139.             client.connect(ssh_server, ssh_port, ssh_user, ssh_password)
  140.             sftp = paramiko.SFTPClient.from_transport(client.get_transport())
  141.             sftp.put(OUT_FILE, ssh_remote_path)
  142.             sftp.close()
  143.             client.close()
  144.             print "[ ] Rules dispatched on <%s>"%ssh_server
  145.         except Exception,e:
  146.             print "[!] Rule dispatching error on <%s>: %s" %(ssh_server, e)
  147.  
  148. #############################################
  149. #       Logging max sid
  150. print "[+] Writing Last SID"
  151. with open(SID_LOG_FILE, "w") as f_sid:
  152.     f_sid.write("%d"%(sid-1))
  153.  
  154. print "[+] Finished!"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement