Skip to main content

Functionality to support usage and development on top of the NetworkSage platform.

Project description

networksage-tools

This repository contains publicly-released tools that will be helpful when interacting with the NetworkSage platform. Note that to upload anything to NetworkSage, you will require either a free or paid API key. To request an API key, please register for an account at https://networksage.seclarity.io/register.

What is NetworkSage?

The NetworkSage platform, first and foremost, acts as a lightweight, privacy-maintaining enrichment layer for your network traffic. It takes network flows (which we call Secflows), categorizes them with one of a couple dozen labels (see our Glossary for details), and compares them with the global dataset of known activity. For every Secflow, it returns:

  • how common it is globally
  • which categorization it has
  • any metadata the security community has provided

To visually illustrate, refer to the following (taken from a public sample we found while creating our first Threat Report).

When this sample was uploaded to NetworkSage, all Secflows were automatically categorized and their global commonality was identified:

Flow Categories and Commonality

In addition, many of those Destinations (an IP or Domain name plus its port) had additional metadata provided by the security community. That information was made available inline:

Destinations with Metadata

Some of the categories associated with certain Secflows also indicated specific Behavior was happening. That information (also provided by the community) was shared for more in-depth knowledge:

Behaviors with Metadata

Finally, some of the Behaviors (when seen in a particular order within some period of time) actually identified more complex interactions that we call Events:

Events with Metadata

Installation

Note that this package requires libpcap-dev to be installed on your system. Please use your system's package manager (such as apt on Ubuntu) to install libpcap-dev:

sudo apt-get install libpcap-dev

While Windows isn't yet supported due to issues with underlying libraries (specifically pcapy), we'd welcome anyone who wants to document the steps to make it work. At the very minimum, you will need the following:

A C++ compiler. Microsoft Visual Studio Build Tools is known to work.
Npcap's SDK, which is a replacement for the WinPCAP developer's kit.

To install the networksage-tools package, simply type the following:

pip install networksage-tools

Available Modules

There are multiple modules available within this package. Details about each are below.

A. Streaming Secflow Collector

module name: streaming

This module allows you to directly capture network traffic as unenriched Secflows (Secflows without flow category labels). This is beneficial for a number of reasons:

  • Secflows are extremely lightweight, so you can actually do this continuously in the background without affecting system performance (i.e. you can collect network telemetry continuously on your endpoints)!
  • Secflows have no identifying data, so you can avoid worrying about accidentally leaking information (URIs, passwords, keys, etc...)

To import this module into your project, type the following:

from networksage_tools.streaming import streaming

Usage

To capture Secflows continuously using this module from your project, enter the following (note that you'll need to be root to capture packets):

streaming.start(<interface_name>, <duration_in_seconds>, <optional_verbosity>) 

Note that the above will run in perpetuity, capturing packets from the interface you specified (such as "enp0s3" on Ubuntu systems). Every time the specified duration you provided is reached (if you provide no value, it defaults to 300 seconds), a sample will be created and uploaded to your NetworkSage account. Providing the optional is_verbose value will print a small amount of information about the number of flows and its UUID.

B. Standalone Converter

module name: converter

This module allows you to convert captured network traffic from any of our supported formats (currently PCAP, PCAPNG, Zeek, and Interflow) into unenriched Secflows (Secflows without flow category labels). This is useful if you already have network telemetry that you'd like to upload to NetworkSage, but you don't want to upload the original file (for privacy, size, or other reasons).

To import this module into your project, type the following:

from networksage_tools.converter import convert

Usage

To convert a PCAP or PCAPNG file into an unenriched Secflow file, simply enter the following:

convert.convert_pcap(<path_to_pcap_file>) 

To convert a Zeek Conn log into an unenriched Secflow file, simply enter the following:

convert.convert_zeek(<path_to_conn_log>, <optional_path_to_dns_log>) 

If you have (and would like to include) DNS information that was captured by Zeek, provide the dns.log in addition to the conn.log. Naming will be much enhanced by doing so.

NOTE: As of v1.0.0 of this package, we now support Zeek files in JSON and plaintext TSV (i.e. the OG) formats. If you are uploading plaintext logs, please make sure that your conn.log files have the following fields in the following order (Field # lines are annotations for clarity below and should NOT be included in the file):

        Field #  1       2        3                 4               5
                ts      uid     id.orig_h       id.orig_p       id.resp_h
        Field #    6             7        8        9               10
                id.resp_p       proto   service duration        orig_bytes
        Field #     11              12              13              14
                resp_bytes      conn_state      local_orig      local_resp
        Field #     15             16      17               18             19
                missed_bytes    history orig_pkts       orig_ip_bytes  resp_pkts
        Field #       20              21
                resp_ip_bytes   tunnel_parents

    An example of a flow line from the conn log is as follows ("field #" lines are my annotation):

        Field #       1                        2                      3
                1601060272.439360       CC9S3G178KjzSMTGRk      192.168.100.224
        Field #   4             5        6       7       8          9
                 137    192.168.100.255 137     udp     dns     12.114023
        Field #  10     11    12      13     14      15      16       17
                1186    0     S0      -       -       0       D       23
        Field #  18     19      20      21
                1830    0       0       -

For dns.log files (again, if you're not using JSON), make sure that the file matches the following:

   Field #       1       2          3               4               5               6             7         8
                ts      uid     id.orig_h       id.orig_p       id.resp_h       id.resp_p       proto   trans_id

   Field #       9       10        11               12             13         14           15        16
                rtt     query    qclass         qclass_name       qtype   qtype_name      rcode   rcode_name

   Field #      17      18      19      20      21        22         23        24
                AA      TC      RD      RA      Z       answers     TTLs    rejected

   Note that all field names are not used. If you do not have a field, please give it an appropriate default
   value as defined by the Zeek format (https://docs.zeek.org/en/master/logs/dns.html).

NOTE: As of v1.1.0 of this package, we now support Interflow logs in JSON format.

To convert an Interflow log into an unenriched Secflow file, simply enter the following:

convert.convert_interflow(<path_to_interflow_log>) 

Any DNS Interflows should also be passed in within the Interflow log.

Note that there are MANY fields in Interflow that will not be a part of this converter, as they are not necessary to convert to Secflow. The log file is expected to contain one Interflow per line in JSON format. For non-DNS records, below is an example Interflow record that includes only the fields we need:

    {"timestamp": 1656517273641, "duration": 401, "_id": "6c0liABC8qtQm3loQr7H", "msg_class": "interflow_traffic", "srcip": "172.18.40.120", "srcport": 55503,"dstip": "142.251.40.65", "dstip_host": "ci3.googleusercontent.com", "dstport": 80, "proto_name": "tcp", "outbytes_total": 0, "inpkts_delta": 5, "outpkts_delta": 0, "inbytes_total": 17765}

Supported File Formats

NetworkSage currently supports uploading the following files (which will be converted into our Secflow format):

  • PCAP
  • PCAPNG
  • Zeek (conn.log and dns.log in TSV or JSON formatting; see prior section for details)
  • Interflow (as JSON, one Interflow record per line)
  • Secflow

If you have a format that you'd like us to support, please review our FAQs and contact support at seclarity [.] io.

Getting Involved

We have a lot of plans to change the face of security. If you want to be involved as a contributor or to be a part of the community we're building, we highly encourage you to join our Slack!

License

This software is provided under the Apache Software License. See the accompanying LICENSE file for more information.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

networksage-tools-1.1.2.tar.gz (9.7 MB view details)

Uploaded Source

Built Distribution

networksage_tools-1.1.2-py3-none-any.whl (9.7 MB view details)

Uploaded Python 3

File details

Details for the file networksage-tools-1.1.2.tar.gz.

File metadata

  • Download URL: networksage-tools-1.1.2.tar.gz
  • Upload date:
  • Size: 9.7 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.8.0 pkginfo/1.8.2 readme-renderer/34.0 requests/2.27.1 requests-toolbelt/0.9.1 urllib3/1.26.8 tqdm/4.63.0 importlib-metadata/4.11.3 keyring/23.5.0 rfc3986/2.0.0 colorama/0.4.3 CPython/3.9.10

File hashes

Hashes for networksage-tools-1.1.2.tar.gz
Algorithm Hash digest
SHA256 cbc8980e134b8f8c22d92fde463b04c1950f5378296430756e78c4268b5e7298
MD5 8136fb3a8c71daedd8b87d3d496d7180
BLAKE2b-256 bb2ee54ff3c741dbdb145a98556872e71394ed6458cdba504e1e3e9b9d4a2873

See more details on using hashes here.

File details

Details for the file networksage_tools-1.1.2-py3-none-any.whl.

File metadata

  • Download URL: networksage_tools-1.1.2-py3-none-any.whl
  • Upload date:
  • Size: 9.7 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.8.0 pkginfo/1.8.2 readme-renderer/34.0 requests/2.27.1 requests-toolbelt/0.9.1 urllib3/1.26.8 tqdm/4.63.0 importlib-metadata/4.11.3 keyring/23.5.0 rfc3986/2.0.0 colorama/0.4.3 CPython/3.9.10

File hashes

Hashes for networksage_tools-1.1.2-py3-none-any.whl
Algorithm Hash digest
SHA256 3ff61b9c4dfc1473c7cf0a4b156a43ec0c10f19f0c94db28aaaeed04035cbcd0
MD5 67f5c2b333450a32190a3f30bb899d67
BLAKE2b-256 b99eecabe76c83d63f68ab92d62a3d3dbfbb48d3aa650616c1c7eb0ac77fb409

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page