A Python client allowing simplified interaction with Rapid7's InsightIDR REST API.
Project description
InsightIDR4Py
A Python client allowing simplified interaction with Rapid7's InsightIDR REST API.
InsightIDR4Py allows analysts to query log data from Rapid7 InsightIDR, analyze it within Python, and/or feed it to other APIs like VirusTotal, AbuseIPDB, or others. This tool handles some of the challenges and complexities of using the InsightIDR REST API, including polling queries in progress, paginated responses, handling the JSON output, and time range queries.
InsightIDR4Py also offers access to some of the additional APIs in the InsightIDR ecosystem. These include:
Investigations
- List Investigations
- Get an Investigation
- Create Investigation
- Close Investigations in Bulk
- List Alerts by Investigation
- List Rapid7 Product Alerts by Investigation
- Update Investigation
- List Comments on an Investigation
- Create Comment
- Delete Comment
Threats
- Create Threat
- Add Indicators to Threat
- Replace Threat Indicators
- Delete Threat
Saved Queries
- List Saved Queries
- Get a Saved Query
- Create Saved Query
- Replace a Saved Query
- Update a Saved Query
- Delete a Saved Query
Happy analyzing!:monocle_face:
Installation
InsightIDR4Py is available on PyPI and can be installed using:
pip install InsightIDR4Py
Prerequisites
You will need obtain an API key from the InsightIDR system. The documentation for this can be found here. From there, you'll use this API key value to create the InsightIDR API object as shown below:
import InsightIDR4Py as idr
# define API key (store this value securely)
api_key = "API_Key_Here"
# create the InsightIDR object
api = idr.InsightIDR(api_key)
Remember to store the API key securely! There are several ways to do this, and you should make sure that the way you choose aligns with your organization's security policy. Python's keyring library is one possibility.
Examples
Example 1: Query DNS Logs for Suspicious TLDs
import InsightIDR4Py as idr
# create the InsightIDR object
api = idr.InsightIDR(api_key)
# define the query parameters
logset_name = "DNS Query"
query = "where(public_suffix IN [buzz, top, club, work, surf, tw, gq, ml, cf, biz, tk, cam, xyz, bond])"
time_range = "Last 36 Hours"
# query the logs
events = api.QueryEvents(logset_name, query, time_range)
# print out an event
print(event[0])
Result:
{'timestamp': '2021-09-28T15:11:45.000Z', 'asset': 'windesk05.organization.com', 'source_address': '192.168.4.10', 'query': 'regulationprivilegescan.top', 'public_suffix': 'top', 'top_private_domain': 'regulationprivilegescan.top', 'query_type': 'A', 'source_data': '09/28/2021 8:11:45 AM 1480 PACKET 00000076ED1A0140 UDP Rcv 192.168.4.121 c3b3 Q [0001 D NOERROR] A (3)regulationprivilegescan(3)top(0)'}
Example 2: Query Authentication Logs for top Five Failed Logins, Grouped by Count
import InsightIDR4Py as idr
# create the InsightIDR object
api = idr.InsightIDR(api_key)
# define the query parameters
logset_name = "Asset Authentication"
query = "where(source_json.eventCode = 4625) groupby(destination_account) limit(5)"
time_range = "Last 24 Hours"
# query the logs
groups = api.QueryGroups(logset_name, query, time_range)
# print out the groups
for group in groups.items():
print(group)
Result:
('Mark.Corrigan', 132)
('Jeremy.Usborne', 102)
('Sophie.Chapman', 88)
('Alan.Johnson', 64)
('Super.Hans', 24)
Example 3: Query VPN Logins from a Certain IP Range and Check the Results Using AbuseIPDB
This example uses python-abuseipdb, a Python object oriented wrapper for AbuseIPDB v2 API.
It requires an API key, which you can get by creating a free account. From there, go to User Account > API, choose Create Key, and enter this string into the abuse_ip_db_api_key variable in the example below.
The same API key security principles mentioned above apply here. Guard your API keys to prevent rogue usage!
import InsightIDR4Py as idr
import abuseipdb import *
# create the InsightIDR object
api = idr.InsightIDR(api_key)
# define the AbuseIPDB API key
abuse_ip_db_api_key = "YOUR_KEY_HERE"
# define the query parameters
logset_name = "Ingress Authentication"
query = "where(service = vpn AND source_ip = IP(64.62.128.0/17))"
time_range = "Last 24 Hours"
# query the logs
events = api.QueryEvents(logset_name, query, time_range)
# check the source IP addresses in AbuseIPDB and display results
if len(events) > 0:
ipdb = AbuseIPDB(abuse_ip_db_api_key)
for event in events:
check = ipdb.check(event["source_ip"])
print("----------")
print("IP Address: " + ip_check.ipAddress)
print("Last reported at: " + ip_check.lastReportedAt)
print("Abuse confidence score: " + str(ip_check.abuseConfidenceScore))
print("Abuser country: " + ip_check.countryName)
print("Abuser ISP: " + ip_check.isp)
print("Total reports of abuser: " + str(ip_check.totalReports))
print("----------")
License
This repository is licensed under an MIT license, which grants extensive permission to use this material however you wish.
Contributing
You are welcome to contribute however you wish! I appreciate feedback in any format.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file InsightIDR4Py-0.3.tar.gz
.
File metadata
- Download URL: InsightIDR4Py-0.3.tar.gz
- Upload date:
- Size: 11.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.10.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 86266a4bb2758de9382ce070ed7ac036b19c62aa6c4c7ac020d570354c577701 |
|
MD5 | c91bd2c681e9f2527c433f6aee3260d0 |
|
BLAKE2b-256 | 7a2ae3c36b5ff714b7d3fc065936facdaba1c3101d3c176129c4acfb42898c46 |