mig/README.md

87 строки
5.0 KiB
Markdown
Исходник Обычный вид История

2014-02-11 21:39:17 +04:00
MIG: Mozilla InvestiGator
=========================
2015-04-24 18:50:24 +03:00
<img style="float: right" src="doc/.files/MIG-logo-CC-small.jpg" size="300px">
2013-12-05 20:27:03 +04:00
2014-12-22 04:24:14 +03:00
**Note: MIG is under heavy development. The code is stable and used in production, but changes may be backward incompatible. Be warned.**
2014-11-03 05:52:22 +03:00
2014-12-31 06:08:34 +03:00
[![Build Status](https://travis-ci.org/mozilla/mig.svg?branch=master)](https://travis-ci.org/mozilla/mig)
2014-06-29 20:58:45 +04:00
MIG is OpSec's platform for investigative surgery of remote endpoints.
2015-04-24 18:50:24 +03:00
MIG is composed of agents installed on all systems of an infrastructure that are
be queried in real-time to investigate the file-systems, network state, memory
or configuration of endpoints.
| Capability | Linux | MacOS | Windows |
| ----------------- | ----- | ----- | ------- |
| file inspection | ![check](doc/.files/check_mark_green.png) | ![check](doc/.files/check_mark_green.png) | ![check](doc/.files/check_mark_green.png) |
| network inspection| ![check](doc/.files/check_mark_green.png) | ![check](doc/.files/check_mark_green.png) | (partial) |
| memory inspection | ![check](doc/.files/check_mark_green.png) | ![check](doc/.files/check_mark_green.png) | ![check](doc/.files/check_mark_green.png) |
| vuln management | ![check](doc/.files/check_mark_green.png) | (planned) | (planned) |
| system auditing | (planned) | (planned) | (planned) |
Imagine that it's 7am on a saturday morning, and someone just released a
critical vulnerability for your favorite PHP application. The vuln is already
exploited and security groups are releasing indicators of compromise. Your
weekend isn't starting great, and the thought of manually inspecting thousands
of systems isn't making it any better.
MIG can help. The signature of the vulnerable PHP app (an md5 of a file, a regex
on file, or just a filename) can be searched for across all your systems using
2015-04-24 18:50:24 +03:00
the `file` module. Similarly, indicators of compromise such as specific log
entries, backdoor files with {md5,sha{1,256,512,3-{256,512}}} hashes, IP
addresses from botnets or signature in processes memories can be investigated
using MIG. Suddenly, your weekend is looking a lot better. And with just a few
command lines, thousands of systems will be remotely investigated to verify that
you're not at risk.
2014-04-02 01:49:35 +04:00
2015-04-24 18:50:24 +03:00
![MIG command line demo](doc/.files/mig-cmd-demo.gif)
2014-02-07 20:40:39 +04:00
2015-04-24 18:50:24 +03:00
MIG agents are designed to be lightweight, secure, and easy to deploy so you can
ask your favorite sysadmins to add it to a base deployment without fear of
breaking the entire production network. All parameters are built into the agent
at compile time, including the list and ACLs of authorized investigators.
Security is enforced using PGP keys, and even if MIG's servers are compromised,
as long as our keys are safe on your investigator's laptop, no one will break
into the agents.
2014-02-07 20:40:39 +04:00
MIG is designed to be fast, and asynchronous. It uses AMQP to distribute actions
to endpoints, and relies on Go channels to prevent components from blocking.
2015-04-24 18:50:24 +03:00
Running actions and commands are stored in a Postgresql database and on disk cache,
such that the reliability of the platform doesn't depend on long-running processes.
2014-02-07 20:40:39 +04:00
Speed is a strong requirement. Most actions will only take a few hundreds
2015-04-24 18:50:24 +03:00
milliseconds to run on agents. Larger ones, for example when looking for a hash in
a big directory, should run in less than a minute or two. All in all, an
investigation usually completes in between 10 and 300 seconds.
2014-06-29 20:58:45 +04:00
Privacy and security are paramount. Agents never send raw data back to the
platform, but only reply to questions instead. All actions are signed by GPG
2015-04-24 18:50:24 +03:00
keys that are not stored in the platform, thus preventing a compromise from
2014-06-29 20:58:45 +04:00
taking over the entire infrastructure.
2014-02-07 20:40:39 +04:00
2014-10-11 23:04:35 +04:00
Discussion
----------
Join **#mig** on [irc.mozilla.org](https://wiki.mozilla.org/IRC)
2014-07-26 00:02:53 +04:00
Video presentation
------------------
Check out this 10 minutes video for a more general presentation and a demo of
the console interface.
[![MIG youtube video](http://img.youtube.com/vi/wJwj5YB6FFA/0.jpg)](http://www.youtube.com/watch?v=wJwj5YB6FFA)
2014-02-07 20:40:39 +04:00
Documentation
-------------
2015-04-24 18:50:24 +03:00
All documentation is available in the 'doc' directory and on http://mig.mozilla.org .
2014-07-25 06:11:59 +04:00
* [Concepts & Internal Components](doc/concepts.rst)
* [Installation & Configuration](doc/configuration.rst)
2014-05-22 22:20:24 +04:00
Bug & Issue tracker
-------------------
We use Bugzilla to track the work on MIG.
* List open bugs: [Bugzilla MIG](https://bugzilla.mozilla.org/showdependencytree.cgi?id=896480&hide_resolved=1)
2014-12-31 06:08:34 +03:00
* Create a new bug: [Bugzilla OpSec](https://bugzilla.mozilla.org/enter_bug.cgi?blocked=896480&bug_file_loc=http%3A%2F%2F&bug_ignored=0&bug_severity=normal&bug_status=NEW&cf_blocking_b2g=---&cf_fx_iteration=---&cf_fx_points=---&component=Operations%20Security%20%28OpSec%29%3A%20MIG&contenttypemethod=autodetect&contenttypeselection=text%2Fplain&defined_groups=1&flag_type-4=X&flag_type-607=X&flag_type-791=X&flag_type-800=X&flag_type-803=X&form_name=enter_bug&maketemplate=Remember%20values%20as%20bookmarkable%20template&op_sys=Linux&priority=--&product=mozilla.org&qa_contact=jvehent%40mozilla.com&rep_platform=x86_64&short_desc=%5Bmig%5D%20Insert%20a%20descriptive%20title%20here&target_milestone=---&version=other)