2014-02-11 21:39:17 +04:00
|
|
|
MIG: Mozilla InvestiGator
|
|
|
|
=========================
|
2015-04-24 18:50:24 +03:00
|
|
|
<img style="float: right" src="doc/.files/MIG-logo-CC-small.jpg" size="300px">
|
2013-12-05 20:27:03 +04:00
|
|
|
|
2014-12-31 06:08:34 +03:00
|
|
|
[![Build Status](https://travis-ci.org/mozilla/mig.svg?branch=master)](https://travis-ci.org/mozilla/mig)
|
|
|
|
|
2014-06-29 20:58:45 +04:00
|
|
|
MIG is OpSec's platform for investigative surgery of remote endpoints.
|
|
|
|
|
2015-04-24 18:50:24 +03:00
|
|
|
MIG is composed of agents installed on all systems of an infrastructure that are
|
|
|
|
be queried in real-time to investigate the file-systems, network state, memory
|
|
|
|
or configuration of endpoints.
|
|
|
|
|
|
|
|
| Capability | Linux | MacOS | Windows |
|
|
|
|
| ----------------- | ----- | ----- | ------- |
|
|
|
|
| file inspection | ![check](doc/.files/check_mark_green.png) | ![check](doc/.files/check_mark_green.png) | ![check](doc/.files/check_mark_green.png) |
|
|
|
|
| network inspection| ![check](doc/.files/check_mark_green.png) | ![check](doc/.files/check_mark_green.png) | (partial) |
|
|
|
|
| memory inspection | ![check](doc/.files/check_mark_green.png) | ![check](doc/.files/check_mark_green.png) | ![check](doc/.files/check_mark_green.png) |
|
|
|
|
| vuln management | ![check](doc/.files/check_mark_green.png) | (planned) | (planned) |
|
2015-07-23 18:34:08 +03:00
|
|
|
| log analysis | (planned) | (planned) | (planned) |
|
2015-04-24 18:50:24 +03:00
|
|
|
| system auditing | (planned) | (planned) | (planned) |
|
|
|
|
|
2015-07-23 18:34:08 +03:00
|
|
|
Imagine it is 7am on a saturday morning, and someone just released a
|
2015-04-24 18:50:24 +03:00
|
|
|
critical vulnerability for your favorite PHP application. The vuln is already
|
2015-07-23 18:34:08 +03:00
|
|
|
exploited and security groups are releasing indicators of compromise (IOCs).
|
|
|
|
Your weekend isn't starting great, and the thought of manually inspecting
|
|
|
|
thousands of systems isn't making it any better.
|
|
|
|
|
|
|
|
MIG can help. The signature of the vulnerable PHP app (the md5 of a file, a regex,
|
|
|
|
or just a filename) can be searched for across all your systems using
|
|
|
|
the `file` module. Similarly, IOCs such as specific log entries, backdoor files
|
|
|
|
with {md5,sha{1,256,512,3-{256,512}}} hashes, IP addresses from botnets or byte
|
|
|
|
strings in processes memories can be investigated using MIG. Suddenly, your
|
|
|
|
weekend is looking a lot better. And with just a few commands, thousands of systems
|
|
|
|
will be remotely investigated to verify that you're not at risk.
|
2014-04-02 01:49:35 +04:00
|
|
|
|
2015-04-24 18:50:24 +03:00
|
|
|
![MIG command line demo](doc/.files/mig-cmd-demo.gif)
|
2014-02-07 20:40:39 +04:00
|
|
|
|
2015-04-24 18:50:24 +03:00
|
|
|
MIG agents are designed to be lightweight, secure, and easy to deploy so you can
|
|
|
|
ask your favorite sysadmins to add it to a base deployment without fear of
|
|
|
|
breaking the entire production network. All parameters are built into the agent
|
|
|
|
at compile time, including the list and ACLs of authorized investigators.
|
|
|
|
Security is enforced using PGP keys, and even if MIG's servers are compromised,
|
|
|
|
as long as our keys are safe on your investigator's laptop, no one will break
|
|
|
|
into the agents.
|
2014-02-07 20:40:39 +04:00
|
|
|
|
|
|
|
MIG is designed to be fast, and asynchronous. It uses AMQP to distribute actions
|
|
|
|
to endpoints, and relies on Go channels to prevent components from blocking.
|
2015-04-24 18:50:24 +03:00
|
|
|
Running actions and commands are stored in a Postgresql database and on disk cache,
|
|
|
|
such that the reliability of the platform doesn't depend on long-running processes.
|
2014-02-07 20:40:39 +04:00
|
|
|
|
|
|
|
Speed is a strong requirement. Most actions will only take a few hundreds
|
2015-04-24 18:50:24 +03:00
|
|
|
milliseconds to run on agents. Larger ones, for example when looking for a hash in
|
|
|
|
a big directory, should run in less than a minute or two. All in all, an
|
|
|
|
investigation usually completes in between 10 and 300 seconds.
|
2014-06-29 20:58:45 +04:00
|
|
|
|
|
|
|
Privacy and security are paramount. Agents never send raw data back to the
|
|
|
|
platform, but only reply to questions instead. All actions are signed by GPG
|
2015-04-24 18:50:24 +03:00
|
|
|
keys that are not stored in the platform, thus preventing a compromise from
|
2014-06-29 20:58:45 +04:00
|
|
|
taking over the entire infrastructure.
|
2014-02-07 20:40:39 +04:00
|
|
|
|
2015-07-23 18:34:08 +03:00
|
|
|
Technology
|
2014-10-11 23:04:35 +04:00
|
|
|
----------
|
2015-07-23 18:34:08 +03:00
|
|
|
MIG is built in Go and uses a REST API that receives signed JSON messages distributed
|
|
|
|
to agents via RabbitMQ and stored in a Postgres database.
|
2014-02-11 21:07:51 +04:00
|
|
|
|
2015-07-23 18:34:08 +03:00
|
|
|
It is:
|
|
|
|
* Massively Distributed means Fast.
|
|
|
|
* Simple to deploy and Cross-Platform.
|
|
|
|
* Secured using OpenPGP.
|
|
|
|
* Respectful of privacy by never retrieving raw data from endpoints.
|
2014-07-26 00:02:53 +04:00
|
|
|
|
|
|
|
Check out this 10 minutes video for a more general presentation and a demo of
|
|
|
|
the console interface.
|
|
|
|
|
|
|
|
[![MIG youtube video](http://img.youtube.com/vi/wJwj5YB6FFA/0.jpg)](http://www.youtube.com/watch?v=wJwj5YB6FFA)
|
2014-02-11 21:07:51 +04:00
|
|
|
|
2015-07-23 18:34:08 +03:00
|
|
|
A more detailed presentation is available at [MIG HITB Slides](https://jve.linuxwall.info/ressources/taf/MIG_HITB/).
|
|
|
|
|
|
|
|
Discussion
|
|
|
|
----------
|
|
|
|
Join **#mig** on [irc.mozilla.org](https://wiki.mozilla.org/IRC)
|
|
|
|
|
2014-02-07 20:40:39 +04:00
|
|
|
Documentation
|
|
|
|
-------------
|
2015-04-24 18:50:24 +03:00
|
|
|
All documentation is available in the 'doc' directory and on http://mig.mozilla.org .
|
2014-07-25 06:11:59 +04:00
|
|
|
* [Concepts & Internal Components](doc/concepts.rst)
|
|
|
|
* [Installation & Configuration](doc/configuration.rst)
|
2014-05-22 22:20:24 +04:00
|
|
|
|
|
|
|
Bug & Issue tracker
|
|
|
|
-------------------
|
|
|
|
We use Bugzilla to track the work on MIG.
|
|
|
|
* List open bugs: [Bugzilla MIG](https://bugzilla.mozilla.org/showdependencytree.cgi?id=896480&hide_resolved=1)
|
2015-07-25 16:41:32 +03:00
|
|
|
* Create a new bug: [New Bug in
|
|
|
|
Bugzilla](https://bugzilla.mozilla.org/enter_bug.cgi?assigned_to=nobody%40mozilla.org&blocked=896480&bug_file_loc=http%3A%2F%2F&bug_ignored=0&bug_severity=normal&bug_status=NEW&cf_fx_iteration=---&cf_fx_points=---&component=MIG&contenttypemethod=autodetect&contenttypeselection=text%2Fplain&defined_groups=1&flag_type-4=X&flag_type-607=X&flag_type-791=X&flag_type-800=X&form_name=enter_bug&maketemplate=Remember%20values%20as%20bookmarkable%20template&op_sys=Linux&priority=--&product=Enterprise%20Information%20Security&qa_contact=jvehent%40mozilla.com&rep_platform=x86_64&short_desc=[mig]%20INSERT%20DESCRIPTIVE%20TITLE%20HERE&target_milestone=---&version=unspecified)
|