|
9 | 9 | <h2 align="center">Fibratus</h2> |
10 | 10 |
|
11 | 11 | <p align="center"> |
12 | | - A modern tool for Windows kernel exploration and observability with a focus on security |
| 12 | + Adversary tradecraft detection, protection, and hunting |
13 | 13 | <br> |
14 | 14 | <a href="https://www.fibratus.io/#/setup/installation"><strong>Get Started »</strong></a> |
15 | 15 | <br> |
16 | 16 | <br> |
17 | 17 | <strong> |
18 | 18 | <a href="https://www.fibratus.io">Docs</a> |
19 | 19 | • |
| 20 | + <a href="https://github.com/rabbitstack/fibratus/tree/master/rules">Rules</a> |
| 21 | + • |
20 | 22 | <a href="https://github.com/rabbitstack/fibratus/tree/master/filaments">Filaments</a> |
21 | 23 | • |
22 | 24 | <a href="https://github.com/rabbitstack/fibratus/releases">Download</a> |
|
27 | 29 |
|
28 | 30 | ### What is Fibratus? |
29 | 31 |
|
30 | | -Fibratus is a tool for exploration and tracing of the **Windows** kernel. It lets you trap system-wide [events](https://www.fibratus.io/#/kevents/anatomy) such as process life-cycle, file system I/O, registry modifications or network requests among many other observability signals. In a nutshell, Fibratus allows for gaining deep operational visibility into the Windows kernel but also processes running on top of it. It requires no drivers nor third-party software. |
| 32 | +Fibratus detects, protects, and erradicates advanced adversary tradecraft by scrutinizing |
| 33 | +and asserting a wide spectrum of system events against a behaviour-driven [rule engine](https://www.fibratus.io/#/filters/rules) and [YARA](https://www.fibratus.io/#/yara/introduction) memory scanner. |
31 | 34 |
|
32 | | -Events can be shipped to a wide array of [output sinks](https://www.fibratus.io/#/outputs/introduction) or dumped to [capture](https://www.fibratus.io/#/captures/introduction) files for local inspection and forensics analysis. The powerful [filtering](https://www.fibratus.io/#/filters/introduction) engine permits drilling into the event flux entrails and the [rules engine](https://www.fibratus.io/#/filters/rules) is capable of detecting stealthy adversary attacks and sophisticated threats. |
| 35 | +Events can also be shipped to a wide array of [output sinks](https://www.fibratus.io/#/outputs/introduction) or dumped to [capture](https://www.fibratus.io/#/captures/introduction) files for local inspection and forensics analysis. You can use [filaments](https://www.fibratus.io/#/filaments/introduction) to extend Fibratus with your own arsenal of tools and so leverage the power of the Python ecosystem. |
33 | 36 |
|
34 | | -You can use [filaments](https://www.fibratus.io/#/filaments/introduction) to extend Fibratus with your own arsenal of tools and so leverage the power of the Python ecosystem |
| 37 | +In a nuthsell, Fibratus mantra is defined by the pillars of **realtime behaviour detection**, **memory scanning**, and **forensics** capabilities. |
35 | 38 |
|
36 | 39 | ### Quick start |
37 | 40 |
|
38 | | -Check the [walkthrough](https://www.fibratus.io/#/filters/rules?id=loading-rules) on how to load and create detection rules. |
39 | | - |
40 | | -- Observe Microsoft Outlook attachments creating on the file system |
41 | | - |
42 | | -``` |
43 | | -fibratus run file.operation = 'create' and file.name icontains '\\Content.Outlook\\' |
44 | | -``` |
45 | | - |
46 | | -- Hunt remote thread creations |
47 | | - |
48 | | -``` |
49 | | -fibratus run kevt.name = 'CreateThread' and kevt.pid != thread.pid |
50 | | -``` |
51 | | - |
52 | | -- Record network interactions to the capture file |
53 | | - |
54 | | -``` |
55 | | -fibratus capture kevt.category = 'net' -o conns.kcap |
56 | | -``` |
57 | | - |
58 | | -- Replay events from the capture |
59 | | - |
60 | | -``` |
61 | | -fibratus replay net.dport in (443, 80) -k conns.kcap |
62 | | -``` |
63 | | - |
64 | | -- Run the filament for watching file system changes |
| 41 | +--- |
65 | 42 |
|
| 43 | +- [Install](https://www.fibratus.io/#/setup/installation) Fibratus from the latest [MSI package](https://github.com/rabbitstack/fibratus/releases) |
| 44 | +- spin up a command line prompt |
| 45 | +- list credentials from the vault by using the `VaultCmd` tool |
66 | 46 | ``` |
67 | | -fibratus run -f watch_files |
| 47 | +$ VaultCmd.exe /listcreds:"Windows Credentials" /all |
68 | 48 | ``` |
| 49 | +- `Credential discovery via VaultCmd.exe` rule should trigger displaying the alert in the systray notification area |
69 | 50 |
|
70 | | -### Features |
71 | | - |
72 | | -- :zap: blazing fast |
73 | | -- :satellite: collects a wide spectrum of kernel events - from process to network observability signals |
74 | | -- :mag: super powerful filtering and rule engine |
75 | | -- :snake: running Python scriptlets on top of kernel event flow |
76 | | -- :minidisc: capturing event flux to **kcap** files and replaying anywhere |
77 | | -- :rocket: transporting events to Elasticsearch, RabbitMQ or console sinks |
78 | | -- :scissors: transforming kernel events |
79 | | -- :dart: scanning malicious processes and files with Yara |
80 | | -- :file_folder: PE (Portable Executable) introspection |
81 | | - |
82 | | -### [Documentation](https://www.fibratus.io) |
83 | | ---- |
84 | | - |
85 | | -### Setup |
86 | | - |
87 | | -* [**Installation**](https://www.fibratus.io/#/setup/installation) |
88 | | -* [**Building from source**](https://www.fibratus.io/#/setup/installation?id=building-from-source) |
89 | | -* [**Running as standalone binary**](https://www.fibratus.io/#/setup/running?id=standalone-binary) |
90 | | -* [**Running as Windows Service**](https://www.fibratus.io/#/setup/running?id=windows-service) |
91 | | -* [**CLI**](https://www.fibratus.io/#/setup/running?id=cli) |
92 | | -* [**Configuration**](https://www.fibratus.io/#/setup/configuration) |
93 | | - |
94 | | -### Events |
95 | | - |
96 | | -* [**Anatomy of an event**](https://www.fibratus.io/#/kevents/anatomy) |
97 | | -* [**Process**](https://www.fibratus.io/#/kevents/process) |
98 | | -* [**Thread**](https://www.fibratus.io/#/kevents/thread) |
99 | | -* [**Image**](https://www.fibratus.io/#/kevents/image) |
100 | | -* [**File**](https://www.fibratus.io/#/kevents/file) |
101 | | -* [**Registry**](https://www.fibratus.io/#/kevents/registry) |
102 | | -* [**Network**](https://www.fibratus.io/#/kevents/network) |
103 | | -* [**Handle**](https://www.fibratus.io/#/kevents/handle) |
104 | | - |
105 | | -### Filters and Rules |
106 | | - |
107 | | -* [**Needle in the haystack**](https://www.fibratus.io/#/filters/introduction) |
108 | | -* [**Prefiltering**](https://www.fibratus.io/#/filters/prefiltering) |
109 | | -* [**Filtering**](https://www.fibratus.io/#/filters/filtering) |
110 | | -* [**Operators**](https://www.fibratus.io/#/filters/operators) |
111 | | -* [**Functions**](https://www.fibratus.io/#/filters/functions) |
112 | | -* [**Paths**](https://www.fibratus.io/#/filters/paths) |
113 | | -* [**Fields**](https://www.fibratus.io/#/filters/fields) |
114 | | -* [**Rules**](https://www.fibratus.io/#/filters/rules) |
115 | | - |
116 | | -### Captures |
117 | | - |
118 | | -* [**Immortalizing the event flux**](https://www.fibratus.io/#/captures/introduction) |
119 | | -* [**Capturing**](https://www.fibratus.io/#/captures/capturing) |
120 | | -* [**Replaying**](https://www.fibratus.io/#/captures/replaying) |
121 | | - |
122 | | -### Filaments |
123 | | - |
124 | | -* [**Python meets kernel events**](https://www.fibratus.io/#/filaments/introduction) |
125 | | -* [**Executing**](https://www.fibratus.io/#/filaments/executing) |
126 | | -* [**Internals**](https://www.fibratus.io/#/filaments/internals) |
127 | | -* [**Writing filaments**](https://www.fibratus.io/#/filaments/writing) |
128 | | - |
129 | | -### Outputs |
130 | | - |
131 | | -* [**Transporting kernel events**](https://www.fibratus.io/#/outputs/introduction) |
132 | | -* [**Console**](https://www.fibratus.io/#/outputs/console) |
133 | | -* [**Null**](https://www.fibratus.io/#/outputs/null) |
134 | | -* [**RabbitMQ**](https://www.fibratus.io/#/outputs/rabbitmq) |
135 | | -* [**Elasticsearch**](https://www.fibratus.io/#/outputs/elasticsearch) |
136 | | -* [**Eventlog**](https://www.fibratus.io/#/outputs/eventlog) |
137 | | -* [**HTTP**](https://www.fibratus.io/#/outputs/http) |
138 | | - |
139 | | - |
140 | | -### Transformers |
141 | | - |
142 | | -* [**Parsing, enriching, transforming**](https://www.fibratus.io/#/transformers/introduction) |
143 | | -* [**Remove**](https://www.fibratus.io/#/transformers/remove) |
144 | | -* [**Rename**](https://www.fibratus.io/#/transformers/rename) |
145 | | -* [**Replace**](https://www.fibratus.io/#/transformers/replace) |
146 | | -* [**Tags**](https://www.fibratus.io/#/transformers/tags) |
147 | | -* [**Trim**](https://www.fibratus.io/#/transformers/trim) |
148 | | - |
149 | | -### Alerts |
150 | | - |
151 | | -* [**Watchdogging kernel events**](https://www.fibratus.io/#/alerts/introduction) |
152 | | -* [**Mail**](https://www.fibratus.io/#/alerts/senders/mail) |
153 | | -* [**Slack**](https://www.fibratus.io/#/alerts/senders/slack) |
154 | | -* [**Filament alerting**](https://www.fibratus.io/#/alerts/filaments) |
155 | | - |
156 | | -### PE (Portable Executable) |
157 | | - |
158 | | -* [**Portable Executable introspection**](https://www.fibratus.io/#/pe/introduction) |
159 | | -* [**Sections**](https://www.fibratus.io/#/pe/sections) |
160 | | -* [**Symbols**](https://www.fibratus.io/#/pe/symbols) |
161 | | -* [**Resources**](https://www.fibratus.io/#/pe/resources) |
162 | | - |
163 | | -### YARA |
164 | | - |
165 | | -* [**Pattern matching swiss knife**](https://www.fibratus.io/#/yara/introduction) |
166 | | -* [**Scanning processes**](https://www.fibratus.io/#/yara/scanning) |
167 | | -* [**Alerts**](https://www.fibratus.io/#/yara/alerts) |
168 | | - |
169 | | -### Troubleshooting |
| 51 | +### Documentation |
170 | 52 |
|
171 | | -* [**Logs**](https://www.fibratus.io/#/troubleshooting/logs) |
172 | | -* [**Stats**](https://www.fibratus.io/#/troubleshooting/stats) |
173 | | -* [**Profiling**](https://www.fibratus.io/#/troubleshooting/pprof) |
| 53 | +To fully exploit and learn about Fibratus capabilities, read the [docs](https://www.fibratus.io). |
174 | 54 |
|
175 | 55 | --- |
176 | 56 |
|
|
0 commit comments