OpenEDR - Open EDR Public Repository
2020-11-18 20:30:00 Author: www.blogger.com(查看原文) 阅读量:167 收藏

tag:blogger.com,1999:blog-8317222231133660547.post-78312259053272019622020-11-18T08:30:00.029-03:002020-11-18T08:30:06.258-03:00OpenEDR - Open EDR Public Repository<div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-02gmDwssX6I/X7NeUmSof6I/AAAAAAAAUZM/DsK-gF0mowYMB78XRA12uNh2Nj4ChbV-gCNcBGAsYHQ/s1472/openedr_1.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="326" data-original-width="1472" height="142" src="https://1.bp.blogspot.com/-02gmDwssX6I/X7NeUmSof6I/AAAAAAAAUZM/DsK-gF0mowYMB78XRA12uNh2Nj4ChbV-gCNcBGAsYHQ/w640-h142/openedr_1.jpeg" width="640" /></a></div><p><br /></p> <p>We at OpenEDR believe in creating a <a href="https://www.kitploit.com/search/label/Cybersecurity" target="_blank" title="cybersecurity">cybersecurity</a> platform with its source code openly available to public, where products and services can be provisioned and managed together. EDR is our starting point. OpenEDR is a full blown EDR capability. It is one of the most sophisticated, effective EDR code base in the world and with the community’s help it will become even better.</p><span><a name='more'></a></span><p><br /></p> <p>OpenEDR is free and its source code is open to public. OpenEDR allows you to analyze what’s happening across your entire environment at base-security-event level. This granularity enables accurate root-causes analysis needed for faster and more effective remediation. Proven to be the best way to convey this type of information, process hierarchy tracking provide more than just data, they offer actionable knowledge. It collects all the details on endpoints, hashes, and base and advanced events. You get detailed file and device trajectory information and can navigate single events to uncover a larger issue that may be compromising your system.</p> <p>OpenEDR’s security architecture simplifies <em>breach detection, protection and visibility</em> by working for all threat vectors without requiring any other agent or solution. The agent records all telemetry information locally and then will send the data to locally hosted or cloud hosted ElasticSeach deployments. Real-time visibility and continuous analysis are the vital elements of the entire endpoint security concept. OpenEDR enables you to perform analysis into what's happening across your environment at base event level granularity. This allows accurate root cause analysis leading to better remediation of your compromises. Integrated Security Architecture of OpenEDR delivers Full Attack Vector Visibility including MITRE Framework.</p> <p>The Open EDR consists of the following components:</p> <ul> <li>Runtime components <ul> <li>Core Library – the basic framework;</li> <li>Service – service application;</li> <li>Process Monitor – components for per-process monitoring; <ul> <li>Injected DLL – the library which is injected into different processes and hooks API calls;</li> <li>Loader for Injected DLL – the driver component which loads injected DLL into each new process</li> <li>Controller for Injected DLL – service component for interaction with Injected DLL;</li> </ul> </li> <li>System Monitor – the genetic container for different kernel-mode components;</li> <li>File-system mini-filter – the kernel component that hooks I/O requests file system;</li> <li>Low-level process monitoring component – monitors processes creation/deletion using system callbacks</li> <li>Low-level registry monitoring component – monitors registry access using system callbacks</li> <li>Self-protection provider – prevents EDR components and configuration from unauthorized changes</li> <li>Network monitor – network filter for monitoring the network activity;</li> </ul> </li> <li>Installer</li> </ul> <p>Generic high-level interaction diagram for runtime components&nbsp;</p><div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-PvAlgzyFxjk/X7NeeA8DyNI/AAAAAAAAUZQ/35JaD8oS6gIolXM8T7fSPy7bdjX92ifyACNcBGAsYHQ/s470/openedr_4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="240" data-original-width="470" height="326" src="https://1.bp.blogspot.com/-PvAlgzyFxjk/X7NeeA8DyNI/AAAAAAAAUZQ/35JaD8oS6gIolXM8T7fSPy7bdjX92ifyACNcBGAsYHQ/w640-h326/openedr_4.png" width="640" /></a></div><p><br /></p><p>&nbsp; <a href="https://camo.githubusercontent.com/072ac985c901ea3abadd55953fa03113fb76a7239860bc573f6bc1acfb706aff/68747470733a2f2f7465636874616c6b2e636f6d6f646f2e636f6d2f77702d636f6e74656e742f75706c6f6164732f323032302f30392f696d6167652e706e67" rel="nofollow" target="_blank" title="Open EDR public repository (5)"></a>For details you can refer here : <a href="https://techtalk.comodo.com/2020/09/19/open-edr-components/" rel="nofollow" target="_blank" title="https://techtalk.comodo.com/2020/09/19/open-edr-components/">https://techtalk.comodo.com/2020/09/19/open-edr-components/</a></p> <br /><span style="font-size: x-large;"><b>Build Instructions</b></span><br /> <p>You should have Microsoft Visual Studio to build the code</p> <ul> <li>Microsoft Visual Studio Solution File is under /openedr/edrav2/build/vs2019/</li> <li>All OpenEDR Projects are in /openedr/edrav2/iprj folder</li> <li>All external Projects and Libraries are in /openedr/edrav2/eprj folder</li> </ul> <br /><span style="font-size: large;"><b>Libraries Used:</b></span><br /> <ul> <li>AWS SDK AWS SDK for C++ : (<a href="https://aws.amazon.com/sdk-for-cpp/" rel="nofollow" target="_blank" title="https://aws.amazon.com/sdk-for-cpp/">https://aws.amazon.com/sdk-for-cpp/</a>)</li> <li>Boost C++ Libraries (<a href="http://www.boost.org/" rel="nofollow" target="_blank" title="http://www.boost.org/">http://www.boost.org/</a>)</li> <li>c-ares: asynchronous resolver library (<a href="https://github.com/c-ares/c-ares" rel="nofollow" target="_blank" title="https://github.com/c-ares/c-ares">https://github.com/c-ares/c-ares</a>)</li> <li>Catch2: a unit <a href="https://www.kitploit.com/search/label/Testing%20Framework" target="_blank" title="testing framework">testing framework</a> for C++ (<a href="https://github.com/catchorg/Catch2" rel="nofollow" target="_blank" title="https://github.com/catchorg/Catch2">https://github.com/catchorg/Catch2</a>)</li> <li>Clare : Command Line parcer for C++ (<a href="https://github.com/catchorg/Clara" rel="nofollow" target="_blank" title="https://github.com/catchorg/Clara">https://github.com/catchorg/Clara</a>)</li> <li>Cli: cross-platform header only C++14 library for interactive command line interfaces (<a href="https://cli.github.com/" rel="nofollow" target="_blank" title="https://cli.github.com/">https://cli.github.com/</a>)</li> <li>Crashpad: crash-reporting system (<a href="https://chromium.googlesource.com/crashpad/crashpad/+/master/README.md" rel="nofollow" target="_blank" title="https://chromium.googlesource.com/crashpad/crashpad/+/master/README.md">https://chromium.googlesource.com/crashpad/crashpad/+/master/README.md</a>)</li> <li>Curl: command-line tool for transferring data specified with URL syntax (<a href="https://curl.haxx.se/" rel="nofollow" target="_blank" title="https://curl.haxx.se/">https://curl.haxx.se/</a>)</li> <li>Detours: for monitoring and instrumenting API calls on Windows. (<a href="https://github.com/microsoft/Detours" rel="nofollow" target="_blank" title="https://github.com/microsoft/Detours">https://github.com/microsoft/Detours</a>)</li> <li>Google APIs: Google APIs (<a href="https://github.com/googleapis/googleapis" rel="nofollow" target="_blank" title="https://github.com/googleapis/googleapis">https://github.com/googleapis/googleapis</a>)</li> <li>JsonCpp: C++ library that allows manipulating JSON values (<a href="https://github.com/open-source-parsers/jsoncpp" rel="nofollow" target="_blank" title="https://github.com/open-source-parsers/jsoncpp">https://github.com/open-source-parsers/jsoncpp</a>)</li> <li>libjson-rpc-cpp: <a href="https://www.kitploit.com/search/label/Cross%20Platform" target="_blank" title="cross platform">cross platform</a> JSON-RPC (remote procedure call) support for C++ (<a href="https://github.com/cinemast/libjson-rpc-cpp" rel="nofollow" target="_blank" title="https://github.com/cinemast/libjson-rpc-cpp">https://github.com/cinemast/libjson-rpc-cpp</a>)</li> <li>libmicrohttpd : C library that provides a compact API and implementation of an HTTP 1.1 web server (<a href="https://www.gnu.org/software/libmicrohttpd/" rel="nofollow" target="_blank" title="https://www.gnu.org/software/libmicrohttpd/">https://www.gnu.org/software/libmicrohttpd/</a>)</li> <li>log4cplus: C++17 logging API (<a href="https://github.com/log4cplus/log4cplus" rel="nofollow" target="_blank" title="https://github.com/log4cplus/log4cplus">https://github.com/log4cplus/log4cplus</a>)</li> <li>MadcHook, MadcHookDrv : Hooking <a href="http://madshi.net/" rel="nofollow" target="_blank" title="http://madshi.net/">http://madshi.net/</a></li> <li>NetFilter SDK &amp; ProtocolFilter: Network filtering toolkit (<a href="https://netfiltersdk.com/" rel="nofollow" target="_blank" title="https://netfiltersdk.com/">https://netfiltersdk.com/</a>)</li> <li>nlohmann JSON: JSON library for C++: (<a href="https://github.com/nlohmann/json" rel="nofollow" target="_blank" title="https://github.com/nlohmann/json">https://github.com/nlohmann/json</a>)</li> <li>OpenSSL Toolkit (<a href="http://www.openssl.org/" rel="nofollow" target="_blank" title="http://www.openssl.org/">http://www.openssl.org/</a>)</li> <li>Tiny AES in C: implementation of the AES ECB, CTR and CBC <a href="https://www.kitploit.com/search/label/Encryption%20Algorithms" target="_blank" title="encryption algorithms">encryption algorithms</a> written in C. (<a href="https://github.com/kokke/tiny-AES-c" rel="nofollow" target="_blank" title="https://github.com/kokke/tiny-AES-c">https://github.com/kokke/tiny-AES-c</a>)</li> <li>Uri: C++ Network URI (<a href="http://www.boost.org/" rel="nofollow" target="_blank" title="http://www.boost.org/">http://www.boost.org/</a>)</li> <li>UTF8-CPP: UTF-8 with C++ (<a href="http://utfcpp.sourceforge.net/" rel="nofollow" target="_blank" title="http://utfcpp.sourceforge.net/">http://utfcpp.sourceforge.net/</a>)</li> <li>xxhash_cpp: xxHash library to C++17. (<a href="https://cyan4973.github.io/xxHash/" rel="nofollow" target="_blank" title="https://cyan4973.github.io/xxHash/">https://cyan4973.github.io/xxHash/</a>)</li> <li>Zlib: Compression Libraries (<a href="https://zlib.net/" rel="nofollow" target="_blank" title="https://zlib.net/">https://zlib.net/</a>)</li> </ul> <br /><span style="font-size: x-large;"><b>Roadmap</b></span><br /> <p>Please refer here for project roadmap : <a href="https://github.com/ComodoSecurity/openedr_roadmap/projects/1" rel="nofollow" target="_blank" title="https://github.com/ComodoSecurity/openedr_roadmap/projects/1">https://github.com/ComodoSecurity/openedr_roadmap/projects/1</a></p> <br /><span style="font-size: x-large;"><b>Installation Instructions</b></span><br /> <p>OpenEDR is single agent that can be installed on Windows endpoints. It generates extensible telemetry data over all security relevant events. It also use file lookup, analysis and verdict systems from Comodo, <a href="https://valkyrie.comodo.com/" rel="nofollow" target="_blank" title="https://valkyrie.comodo.com/">https://valkyrie.comodo.com/</a>. You can also have your own account and free license there.</p> <p>The telemetry data is stored locally on the endpoint itself. You can use any log streaming solution and analysis platform. Here we will present, how can you do remote streaming and analysis via open source tools like <a href="https://www.kitploit.com/search/label/Elasticsearch" target="_blank" title="Elasticsearch">Elasticsearch</a> and Filebeat.</p> <br /><span style="font-size: large;"><b>OpenEDR :</b></span><br /> <p>OpenEDR project will release installer MSI’s signed by Comodo Security Solutions, The default installation folder is C:\Program Files\OpenEdr\EdrAgentV2, currently we don’t have many option to edit/configure the rule set, alerts etc. Those will be coming with upcoming releases.</p> <p>The agent outputs to C:\ProgramData\edrsvc\log\output_events by default, there you will see the EDR telemetry data where you should point this to Filebeat or other log streaming solutions you want.</p> <br /><span style="font-size: large;"><b>Elasticsearch:</b></span><br /> <p>There are multiple options to run Elasticsearch, you can either install and run it on your own machine, on your data center or use Elasticsearch service on public cloud providers like AWS and GCP. If you want to run Elasticsearch by yourself. You can refer to here for installation instructions on various platforms <a href="https://www.elastic.co/guide/en/elasticsearch/reference/current/install-elasticsearch.html" rel="nofollow" target="_blank" title="https://www.elastic.co/guide/en/elasticsearch/reference/current/install-elasticsearch.html">https://www.elastic.co/guide/en/elasticsearch/reference/current/install-elasticsearch.html</a></p> <p>Another option is using Docker, this will also enable a quick start for PoC and later can be extended to be production environment as well. You can access the guide for this setup here : <a href="https://www.elastic.co/guide/en/elasticsearch/reference/7.10/docker.html" rel="nofollow" target="_blank" title="https://www.elastic.co/guide/en/elasticsearch/reference/7.10/docker.html">https://www.elastic.co/guide/en/elasticsearch/reference/7.10/docker.html</a></p> <br /><span style="font-size: large;"><b>Filebeat:</b></span><br /> <p>Filebeat is very good option to transfer OpenEDR outputs to Elasticsearch, you need to install Filebeat on each system you want to monitor. Overall instructions for it can be found here : <a href="https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-installation-configuration.html" rel="nofollow" target="_blank" title="https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-installation-configuration.html">https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-installation-configuration.html</a></p> <p>We don’t have OpenEDR Filebeat modules yet so you need to configure custom input option for filebeat <a href="https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html" rel="nofollow" target="_blank" title="https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html">https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html</a></p> <br /><span style="font-size: x-large;"><b>Releases</b></span><br /> <p><a href="https://github.com/ComodoSecurity/openedr/releases/tag/2.0.0.0" rel="nofollow" target="_blank" title="https://github.com/ComodoSecurity/openedr/releases/tag/2.0.0.0">https://github.com/ComodoSecurity/openedr/releases/tag/2.0.0.0</a></p> <br /><span style="font-size: x-large;"><b>Screenshots</b></span><br /> <p>How OpenEDR integration with a platform looks like and also a showcase for openedr capabilities</p> <p>Detection / Alerting <a href="https://enterprise.comodo.com/dragon/" rel="nofollow" target="_blank" title="Open EDR public repository (44)"></a></p><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-Ibk5lXTblmA/X7Nenpi9EiI/AAAAAAAAUZY/1rHcpMd5bnYknTfpCFv1JRryvJVSAOShQCNcBGAsYHQ/s1913/openedr_7_Screenshot_1.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="881" data-original-width="1913" height="294" src="https://1.bp.blogspot.com/-Ibk5lXTblmA/X7Nenpi9EiI/AAAAAAAAUZY/1rHcpMd5bnYknTfpCFv1JRryvJVSAOShQCNcBGAsYHQ/w640-h294/openedr_7_Screenshot_1.jpeg" width="640" /></a></div><p><br /></p> <p>Event Details <a href="https://enterprise.comodo.com/dragon/" rel="nofollow" target="_blank" title="Open EDR public repository (45)"></a></p><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-XmwRMADikg8/X7NeuSRjECI/AAAAAAAAUZg/yCPQ3U2VbboTDwfPHgKecxwmlrFgB8MWQCNcBGAsYHQ/s1914/openedr_8_Screenshot_2.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="924" data-original-width="1914" height="308" src="https://1.bp.blogspot.com/-XmwRMADikg8/X7NeuSRjECI/AAAAAAAAUZg/yCPQ3U2VbboTDwfPHgKecxwmlrFgB8MWQCNcBGAsYHQ/w640-h308/openedr_8_Screenshot_2.jpeg" width="640" /></a></div><p><br /></p> <p>Dashboard <a href="https://enterprise.comodo.com/dragon/" rel="nofollow" target="_blank" title="Open EDR public repository (46)"></a></p><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-65pupGQSZJQ/X7Ne0MRMI5I/AAAAAAAAUZk/u5sKiTZg3dEJEu9kgYuiTiKKEPN4M8n9wCNcBGAsYHQ/s1913/openedr_9_Screenshot_3.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="909" data-original-width="1913" height="304" src="https://1.bp.blogspot.com/-65pupGQSZJQ/X7Ne0MRMI5I/AAAAAAAAUZk/u5sKiTZg3dEJEu9kgYuiTiKKEPN4M8n9wCNcBGAsYHQ/w640-h304/openedr_9_Screenshot_3.jpeg" width="640" /></a></div><p><br /></p> <p>Process Timeline <a href="https://enterprise.comodo.com/dragon/" rel="nofollow" target="_blank" title="Open EDR public repository (47)"></a></p><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-_2QSxaBExw4/X7Ne5M9eOzI/AAAAAAAAUZs/aGOb7sOa-MU6aTd1KhexVi9nQ8NdA021QCNcBGAsYHQ/s1912/openedr_10_Screenshot_4.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="839" data-original-width="1912" height="280" src="https://1.bp.blogspot.com/-_2QSxaBExw4/X7Ne5M9eOzI/AAAAAAAAUZs/aGOb7sOa-MU6aTd1KhexVi9nQ8NdA021QCNcBGAsYHQ/w640-h280/openedr_10_Screenshot_4.jpeg" width="640" /></a></div><p><br /></p> <p>Process Treeview <a href="https://enterprise.comodo.com/dragon/" rel="nofollow" target="_blank" title="Open EDR public repository (48)"></a></p><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-dPPGvCpVNd0/X7Ne8VaN-oI/AAAAAAAAUZw/aCrpApC9p6IqeqQdqWwvW-oygy2ZJJ7hgCNcBGAsYHQ/s1907/openedr_11_Screenshot_5.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="912" data-original-width="1907" height="306" src="https://1.bp.blogspot.com/-dPPGvCpVNd0/X7Ne8VaN-oI/AAAAAAAAUZw/aCrpApC9p6IqeqQdqWwvW-oygy2ZJJ7hgCNcBGAsYHQ/w640-h306/openedr_11_Screenshot_5.jpeg" width="640" /></a></div><p><br /></p> <p>Event Search <a href="https://enterprise.comodo.com/dragon/" rel="nofollow" target="_blank" title="Open EDR public repository (49)"></a></p><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-96VubWx6W68/X7Ne_9IXGOI/AAAAAAAAUZ4/xb-vYxmSk6Qkf_o1dfq6rYbEALx6Du48wCNcBGAsYHQ/s1914/openedr_12_Screenshot_6.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="927" data-original-width="1914" height="310" src="https://1.bp.blogspot.com/-96VubWx6W68/X7Ne_9IXGOI/AAAAAAAAUZ4/xb-vYxmSk6Qkf_o1dfq6rYbEALx6Du48wCNcBGAsYHQ/w640-h310/openedr_12_Screenshot_6.jpeg" width="640" /></a></div><br /><p><br /></p> <br /><br /><div style="text-align: center;"><b><span style="font-size: x-large;"><a class="kiploit-download" href="https://github.com/ComodoSecurity/openedr" rel="nofollow" target="_blank" title="Download Openedr">Download Openedr</a></span></b></div>Zion3R[email protected]

文章来源: http://www.blogger.com/feeds/8317222231133660547/posts/default/7831225905327201962
如有侵权请联系:admin#unsafe.sh