All Projects → HASecuritySolutions → Vulnwhisperer

HASecuritySolutions / Vulnwhisperer

Licence: apache-2.0
Create actionable data from your Vulnerability Scans

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Vulnwhisperer

Ansible Elk
📊 Ansible playbook for setting up an ELK/EFK stack and clients.
Stars: ✭ 284 (-74.23%)
Mutual labels:  logstash, elasticsearch
Journalbeat
Journalbeat is a log shipper from systemd/journald to Logstash/Elasticsearch
Stars: ✭ 362 (-67.15%)
Mutual labels:  logstash, elasticsearch
Elasticsearch loader
A tool for batch loading data files (json, parquet, csv, tsv) into ElasticSearch
Stars: ✭ 300 (-72.78%)
Mutual labels:  logstash, elasticsearch
Docker Elastic
Deploy Elastic stack in a Docker Swarm cluster. Ship application logs and metrics using beats & GELF plugin to Elasticsearch
Stars: ✭ 202 (-81.67%)
Mutual labels:  logstash, elasticsearch
Docker monitoring logging alerting
Docker host and container monitoring, logging and alerting out of the box using cAdvisor, Prometheus, Grafana for monitoring, Elasticsearch, Kibana and Logstash for logging and elastalert and Alertmanager for alerting.
Stars: ✭ 479 (-56.53%)
Mutual labels:  logstash, elasticsearch
Dsiem
Security event correlation engine for ELK stack
Stars: ✭ 255 (-76.86%)
Mutual labels:  logstash, elasticsearch
Praeco
Elasticsearch alerting made simple.
Stars: ✭ 342 (-68.97%)
Mutual labels:  logstash, elasticsearch
Synesis lite suricata
Suricata IDS/IPS log analytics using the Elastic Stack.
Stars: ✭ 167 (-84.85%)
Mutual labels:  logstash, elasticsearch
Hangout
用java实现一下Logstash的几个常用input/filter/output, 希望能有效率上面的大提升. 现在我们迁移到golang了 https://github.com/childe/gohangout
Stars: ✭ 469 (-57.44%)
Mutual labels:  logstash, elasticsearch
Pfelk
pfSense/OPNsense + ELK
Stars: ✭ 417 (-62.16%)
Mutual labels:  logstash, elasticsearch
Elastiflow
Network flow analytics (Netflow, sFlow and IPFIX) with the Elastic Stack
Stars: ✭ 2,322 (+110.71%)
Mutual labels:  logstash, elasticsearch
Office365 Management Api Elk
An API connector for the Office 365 Management API and the Elastic Stack
Stars: ✭ 13 (-98.82%)
Mutual labels:  logstash, elasticsearch
Docker Elastic Stack
ELK Stack Dockerfile
Stars: ✭ 175 (-84.12%)
Mutual labels:  logstash, elasticsearch
Helk
The Hunting ELK
Stars: ✭ 3,097 (+181.03%)
Mutual labels:  logstash, elasticsearch
Microservices Sample
Sample project to create an application using microservices architecture
Stars: ✭ 167 (-84.85%)
Mutual labels:  logstash, elasticsearch
Elk Docker
Docker configuration for ELK monitoring stack with Curator and Beats data shippers support
Stars: ✭ 342 (-68.97%)
Mutual labels:  logstash, elasticsearch
Elk Docker
Elasticsearch, Logstash, Kibana (ELK) Docker image
Stars: ✭ 1,973 (+79.04%)
Mutual labels:  logstash, elasticsearch
Dockerfile
some personally made dockerfile
Stars: ✭ 2,021 (+83.39%)
Mutual labels:  logstash, elasticsearch
Awesome Elasticsearch
A curated list of the most important and useful resources about elasticsearch: articles, videos, blogs, tips and tricks, use cases. All about Elasticsearch!
Stars: ✭ 4,168 (+278.22%)
Mutual labels:  logstash, elasticsearch
Elk
搭建ELK日志分析平台。
Stars: ✭ 688 (-37.57%)
Mutual labels:  logstash, elasticsearch

Create actionable data from your vulnerability scans

VulnWhisperer is a vulnerability management tool and report aggregator. VulnWhisperer will pull all the reports from the different Vulnerability scanners and create a file with a unique filename for each one, using that data later to sync with Jira and feed Logstash. Jira does a closed cycle full Sync with the data provided by the Scanners, while Logstash indexes and tags all of the information inside the report (see logstash files at /resources/elk6/pipeline/). Data is then shipped to ElasticSearch to be indexed, and ends up in a visual and searchable format in Kibana with already defined dashboards.

Build Status GitHub license Twitter

Currently Supports

Vulnerability Frameworks

Reporting Frameworks

Getting Started

  1. Follow the install requirements
  2. Fill out the section you want to process in frameworks_example.ini file
  3. [JIRA] If using Jira, fill Jira config in the config file mentioned above.
  4. [ELK] Modify the IP settings in the Logstash files to accommodate your environment and import them to your logstash conf directory (default is /etc/logstash/conf.d/)
  5. [ELK] Import the Kibana visualizations
  6. Run Vulnwhisperer

Need assistance or just want to chat? Join our slack channel

Requirements

  • Python 2.7
  • Vulnerability Scanner
  • Reporting System: Jira / ElasticStack 6.6

Install Requirements-VulnWhisperer(may require sudo)

Install OS packages requirement dependencies (Debian-based distros, CentOS don't need it)

sudo apt-get install  zlib1g-dev libxml2-dev libxslt1-dev 

(Optional) Use a python virtualenv to not mess with host python libraries

virtualenv venv (will create the python 2.7 virtualenv)
source venv/bin/activate (start the virtualenv, now pip will run there and should install libraries without sudo)

deactivate (for quitting the virtualenv once you are done)

Install python libraries requirements

pip install -r /path/to/VulnWhisperer/requirements.txt
cd /path/to/VulnWhisperer
python setup.py install

(Optional) If using a proxy, add proxy URL as environment variable to PATH

export HTTP_PROXY=http://example.com:8080
export HTTPS_PROXY=http://example.com:8080

Now you're ready to pull down scans. (see run section)

Configuration

There are a few configuration steps to setting up VulnWhisperer:

  • Configure Ini file
  • Setup Logstash File
  • Import ElasticSearch Templates
  • Import Kibana Dashboards

frameworks_example.ini file

Run

To run, fill out the configuration file with your vulnerability scanner settings. Then you can execute from the command line.

(optional flag: -F -> provides "Fancy" log colouring, good for comprehension when manually executing VulnWhisperer)
vuln_whisperer -c configs/frameworks_example.ini -s nessus 
or
vuln_whisperer -c configs/frameworks_example.ini -s qualys

If no section is specified (e.g. -s nessus), vulnwhisperer will check on the config file for the modules that have the property enabled=true and run them sequentially.

Next you'll need to import the visualizations into Kibana and setup your logstash config. You can either follow the sample setup instructions [here](https://github.com/HASecuritySolutions/VulnWhisperer/wiki/Sample-Guide-ELK-Deployment) or go for the `docker-compose` solution we offer.

Docker-compose

ELK is a whole world by itself, and for newcomers to the platform, it requires basic Linux skills and usually a bit of troubleshooting until it is deployed and working as expected. As we are not able to provide support for each users ELK problems, we put together a docker-compose which includes:

  • VulnWhisperer
  • Logstash 6.6
  • ElasticSearch 6.6
  • Kibana 6.6

The docker-compose just requires specifying the paths where the VulnWhisperer data will be saved, and where the config files reside. If ran directly after git clone, with just adding the Scanner config to the VulnWhisperer config file (/resources/elk6/vulnwhisperer.ini), it will work out of the box.

It also takes care to load the Kibana Dashboards and Visualizations automatically through the API, which needs to be done manually otherwise at Kibana's startup.

For more info about the docker-compose, check on the docker-compose wiki or the FAQ.

Getting Started

Our current Roadmap is as follows:

  • [ ] Create a Vulnerability Standard
  • [ ] Map every scanner results to the standard
  • [ ] Create Scanner module guidelines for easy integration of new scanners (consistency will allow #14)
  • [ ] Refactor the code to reuse functions and enable full compatibility among modules
  • [ ] Change Nessus CSV to JSON (Consistency and Fix #82)
  • [ ] Adapt single Logstash to standard and Kibana Dashboards
  • [ ] Implement Detectify Scanner
  • [ ] Implement Splunk Reporting/Dashboards

On top of this, we try to focus on fixing bugs as soon as possible, which might delay the development. We also very welcome PR's, and once we have the new standard implemented, it will be very easy to add compatibility with new scanners.

The Vulnerability Standard will initially be a new simple one level JSON with all the information that matches from the different scanners having standardized variable names, while maintaining the rest of the variables as they are. In the future, once everything is implemented, we will evaluate moving to an existing standard like ECS or AWS Vulnerability Schema; we prioritize functionality over perfection.

Video Walkthrough -- Featured on ElasticWebinar

Elastic presentation on VulnWhisperer

Authors

Contributors

AS SEEN ON TV

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].