File: libsnort.py

package info (click to toggle)
inguma 0.0.7.2-1
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 6,600 kB
  • ctags: 7,859
  • sloc: python: 74,776; ansic: 344; makefile: 64; sql: 45; sh: 39
file content (132 lines) | stat: -rw-r--r-- 3,845 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
#!/usr/bin/python
"""
Inguma Penetration Testing Toolkit
Copyright (c) 2006, 2007 Joxean Koret, joxeankoret [at] yahoo.es

This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License
as published by the Free Software Foundation; version 2
of the License.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301, USA.
"""
"""
NOTE: Subject to be removed.
"""
import os
import re
import sys

from core import regexp2pyre

class CSnortRule:
    msg = ""
    flow = ""
    contents = []
    classtype = ""
    sid = ""
    rev = ""
    pcre = ""
    reference = ""
    
    def getProperties(self):
        return ("msg", "flow", "content", "classtype", "sid", "rev", "pcre", "reference")
    
    def setProperty(self, param, value):
    
        if value.startswith('"') and value.endswith('"'):
            # Strip the starting and ending quotes
            value = value[1:len(value)-1]

        if param.lower() == "msg":
            self.msg = value
        elif param.lower() == "flow":
            self.flow = value
        elif param.lower() == "content":
            self.contents.append(value)
        elif param.lower() == "classtype":
            self.classtype = value
        elif param.lower() == "sid":
            self.sid = value
        elif param.lower() == "rev":
            self.rev = value
        elif param.lower() == "pcre":
            self.pcre = regexp2pyre(value)
        elif param.lower() == "reference":
            self.reference = value
        else:
            print "Unknow option", param

class CSnortRuleParser:

    path = ""
    rules = []

    def __init__(self, rulepath = "/etc/snort/rules/"):
        self.path = rulepath

    def processLine(self, line):
        """
        
        Example rule: 

        alert tcp $EXTERNAL_NET any -> $SQL_SERVERS $ORACLE_PORTS (msg:"ORACLE misparsed login response"; flow:from_server,established; 
        content:"description=|28|"; nocase; content:!"connect_data=|28|sid="; nocase; content:!"address=|28|protocol=tcp"; nocase; 
        classtype:suspicious-login; sid:1675; rev:4;)
        """
        data = line
        pos = data.find("(")
        
        if pos == -1:
            return False

        data = data[pos+1:len(data)-1]
        objRule = CSnortRule()
        
        for element in data.split(";"):
            properties = element.split(":")
            
            if len(properties) == 2:
                if properties[0].lstrip() in objRule.getProperties():
                    objRule.setProperty(properties[0].lstrip(), properties[1])

        self.rules.append(objRule)

    def parse(self, mfile):
        
        f = file(self.path + os.sep + mfile, "r")

        for line in f:
            if not line.startswith("#") and len(line.replace(" ", "")) > 0:
                self.processLine(line)

def main():
    snortRuleParser = CSnortRuleParser()
    #
    # This is the most important one
    #
    #snortRuleParser.parse("oracle.rules")
    import os
    for x in os.listdir("/etc/snort/rules"):
        if x.endswith(".rules"):
            snortRuleParser.parse(x)

    for rule in snortRuleParser.rules:
        if rule.pcre != "":

            try:
                print rule.msg, repr(rule.pcre)
                p = re.compile(rule.pcre, re.IGNORECASE)
            except:
                print "Rule does not compile:", sys.exc_info()[1]

if __name__ == "__main__":
    main()