forked from p15670423/monkey
89 lines
3.0 KiB
Python
89 lines
3.0 KiB
Python
from datetime import datetime
|
|
|
|
import dateutil
|
|
import flask_restful
|
|
from flask import request
|
|
import flask_pymongo
|
|
|
|
from cc.database import mongo
|
|
from cc.services.node import NodeService
|
|
|
|
__author__ = 'itay.mizeretz'
|
|
|
|
|
|
class TelemetryFeed(flask_restful.Resource):
|
|
def get(self, **kw):
|
|
timestamp = request.args.get('timestamp')
|
|
if "null" == timestamp or timestamp is None: # special case to avoid ugly JS code...
|
|
telemetries = mongo.db.telemetry.find({})
|
|
else:
|
|
telemetries = mongo.db.telemetry.find({'timestamp': {'$gt': dateutil.parser.parse(timestamp)}})\
|
|
|
|
telemetries = telemetries.sort([('timestamp', flask_pymongo.ASCENDING)])
|
|
|
|
return \
|
|
{
|
|
'telemetries': [TelemetryFeed.get_displayed_telemetry(telem) for telem in telemetries],
|
|
'timestamp': datetime.now().isoformat()
|
|
}
|
|
|
|
@staticmethod
|
|
def get_displayed_telemetry(telem):
|
|
return \
|
|
{
|
|
'id': telem['_id'],
|
|
'timestamp': telem['timestamp'].strftime('%d/%m/%Y %H:%M:%S'),
|
|
'hostname': NodeService.get_monkey_by_guid(telem['monkey_guid'])['hostname'],
|
|
'brief': TELEM_PROCESS_DICT[telem['telem_type']](telem)
|
|
}
|
|
|
|
@staticmethod
|
|
def get_tunnel_telem_brief(telem):
|
|
tunnel = telem['data']['proxy']
|
|
if tunnel is None:
|
|
return 'No tunnel is used.'
|
|
else:
|
|
tunnel_host_ip = tunnel.split(":")[-2].replace("//", "")
|
|
tunnel_host = NodeService.get_monkey_by_ip(tunnel_host_ip)['hostname']
|
|
return 'Tunnel set up to machine: %s.' % tunnel_host
|
|
|
|
@staticmethod
|
|
def get_state_telem_brief(telem):
|
|
if telem['data']['done']:
|
|
return 'Monkey died.'
|
|
else:
|
|
return 'Monkey started.'
|
|
|
|
@staticmethod
|
|
def get_exploit_telem_brief(telem):
|
|
target = telem['data']['machine']['ip_addr']
|
|
exploiter = telem['data']['exploiter']
|
|
result = telem['data']['result']
|
|
if result:
|
|
return 'Monkey successfully exploited %s using the %s exploiter.' % (target, exploiter)
|
|
else:
|
|
return 'Monkey failed exploiting %s using the %s exploiter.' % (target, exploiter)
|
|
|
|
@staticmethod
|
|
def get_scan_telem_brief(telem):
|
|
return 'Monkey discovered machine %s.' % telem['data']['machine']['ip_addr']
|
|
|
|
@staticmethod
|
|
def get_systeminfo_telem_brief(telem):
|
|
return 'Monkey collected system information.'
|
|
|
|
@staticmethod
|
|
def get_trace_telem_brief(telem):
|
|
return 'Monkey reached max depth.'
|
|
|
|
|
|
TELEM_PROCESS_DICT = \
|
|
{
|
|
'tunnel': TelemetryFeed.get_tunnel_telem_brief,
|
|
'state': TelemetryFeed.get_state_telem_brief,
|
|
'exploit': TelemetryFeed.get_exploit_telem_brief,
|
|
'scan': TelemetryFeed.get_scan_telem_brief,
|
|
'system_info_collection': TelemetryFeed.get_systeminfo_telem_brief,
|
|
'trace': TelemetryFeed.get_trace_telem_brief
|
|
}
|