nturley3 / zeek-suspect-file-exposure

Zeek Suspect File Exposure

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Sensitive File Exposure Detection

Zeek module which detects access to possibly sensitive files that are exposed. This includes files such as source code files, database files, config files such as .htaccess and others.

It is intended that this module will be enhanced to include detection of strong and weak mime types, as well as payload sample extraction for non-binary files.

Installation/Upgrade

This script was written and tested

Install the latest version through the Zeek package manager:

zkg refresh
zkg install https://github.com/nturley3/zeek-suspect-file-exposure

To upgrade the package:

zkg refresh
zkg upgrade  nturley3/zeek-suspect-file-exposure

See the Zeek Package Manager Docs for more information.

Configuration

No additional Zeek configuration is necessary for this module.

Generated Outputs

This script generates multiple notices:

Field Value Description
HTTPFileExposure:Office_File This indicates access to a MS Office type file (excel, PST etc).
HTTPFileExposure:Database_File This indicates access to a database file, SQL dump etc.
HTTPFileExposure:Sensitive_File This indicates access to a general sensntive file (.htaccess, wordpress config etc).
HTTPFileExposure:SourceCode_File This indicates access to a potentially sensitive source code file (python, perl, ruby etc).

About

Written by @nturley3.

About

Zeek Suspect File Exposure

License:Apache License 2.0


Languages

Language:Zeek 100.0%