You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CONTRIBUTING.md
+1-4Lines changed: 1 addition & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -118,7 +118,7 @@ $ ./make
118
118
119
119
### Running For The First Time
120
120
121
-
By default, Fibratus operates in rule engine mode. It loads the rule set from the `%PROGRAM FILES%\Fibratus\Rules` directory and sends security alerts to the [systray](/alerts/senders/systray) notification area. Optionally, it takes response actions when the rule is fired, such as killing the process.
121
+
By default, Fibratus operates in rule engine mode. It loads the rule set from the `%PROGRAM FILES%\Fibratus\Rules` directory and sends security alerts to [Eventlog](/alerts/senders/eventlog). Optionally, it takes response actions when the rule is fired, such as killing the process.
122
122
Alternatively, Fibratus can forward events to [output](/outputs/introduction) sinks, if it started in event forwarding mode.
123
123
124
124
To start Fibratus in event forwarding mode run the next command from the root directory of this repo:
@@ -129,7 +129,6 @@ $ .\cmd\fibratus\fibratus.exe run --forward
129
129
130
130
If you want to run Fibratus in rule engine mode, follow the next steps:
131
131
132
-
- run the systray server or disable the systray alert sender in the configuration file. You can start the systray server by running the `.\cmd\fibratus\fibratus-systray.exe` binary.
133
132
- modify the configuration file to set the location to the rule files. Go to the `filters` section, and specify the absolute path to the `Rules` and `Macros` directories of this repository.
134
133
```
135
134
filters:
@@ -169,5 +168,3 @@ $ ./make.bat pkg
169
168
```
170
169
171
170
The resulting MSI is placed in the `build\msi` directory.
Copy file name to clipboardExpand all lines: README.md
+13-2Lines changed: 13 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -34,17 +34,28 @@ Events can also be shipped to a wide array of [output sinks](https://www.fibratu
34
34
35
35
In a nutshell, the Fibratus mantra is defined by the pillars of **realtime behavior detection**, **memory scanning**, and **forensics** capabilities.
36
36
37
+
38
+
### Installation
39
+
40
+
- Download the latest [MSI package](https://github.com/rabbitstack/fibratus/releases) and follow the [UI](https://www.fibratus.io/#/setup/installation) wizard or
41
+
alternatively install via `msiexec` in silent mode
42
+
43
+
```
44
+
$ msiexec /i fibratus-2.3.0-amd64.msi /qn
45
+
```
46
+
37
47
### Quick start
38
48
39
49
---
40
50
41
-
-[Install](https://www.fibratus.io/#/setup/installation) Fibratus from the latest [MSI package](https://github.com/rabbitstack/fibratus/releases)
42
51
- spin up a command line prompt
43
52
- list credentials from the vault by using the `VaultCmd` tool
-`Credential discovery via VaultCmd.exe` rule should trigger displaying the alert in the systray notification area
57
+
58
+
`Credential discovery via VaultCmd.exe` rule should trigger and emit the alert to the [Eventlog](https://www.fibratus.io/#/alerts/senders/eventlog). Check the short demo [here](https://www.fibratus.io/#/alerts/senders/images/eventlog.gif).
Copy file name to clipboardExpand all lines: docs/alerts/senders/systray.md
+1-2Lines changed: 1 addition & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ The `systray` alert sender configuration is located in the `alertsenders.systray
10
10
11
11
Indicates whether the `systray` alert sender is enabled.
12
12
13
-
**default**: `true`
13
+
**default**: `false`
14
14
15
15
#### sound
16
16
@@ -23,4 +23,3 @@ Indicates if the associated sound is played when the balloon notification is sho
23
23
Instructs not to display the balloon notification if the current user is in quiet time. During this time, most notifications should not be sent or shown. This lets a user become accustomed to a new computer system without those distractions. Quiet time also occurs for each user after an operating system upgrade or clean installation.
Copy file name to clipboardExpand all lines: docs/filters/fields.md
+18-4Lines changed: 18 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -88,6 +88,16 @@ The following tables summarize available field names that can be used in filter
88
88
| ps.uuid | Unique process identifier resistant to repetition |`ps.uuid > 10000400`|
89
89
| ps.parent.uuid | Unique parent process identifier resistant to repetition |`ps.parent.uuid = 1843450000440`|
90
90
| ps.child.uuid | Unique child process identifier resistant to repetition |`ps.child.uuid > 20030000000`|
91
+
| ps.child.pe.file.name | Original file name of the child process executable supplied at compile-time |`ps.child.pe.file.name = 'NOTEPAD.EXE'`|
92
+
| ps.child.is_wow64 | Indicates if the 32-bit child process is created in 64-bit Windows system |`ps.child.is_wow64`|
93
+
| ps.child.is_packaged | Indicates if the child process is packaged with the MSIX technology |`ps.child.is_packaged`|
94
+
| ps.child.is_protected | Indicates if the child process is a protected process |`ps.child.is_protected`|
95
+
| ps.is_wow64 | Indicates if the process generating the event is a 32-bit child process is created in 64-bit Windows system |`ps.is_wow64`|
96
+
| ps.is_packaged | Indicates if the process process generating the event is packaged with the MSIX technology |`ps.is_packaged`|
97
+
| ps.is_protected | Indicates if the process generating the event is a protected process |`ps.is_protected`|
98
+
| ps.parent.is_wow64 | Indicates if the parent process generating the event is a 32-bit process created in 64-bit Windows system |`ps.parent.is_wow64`|
99
+
| ps.parent.is_packaged | Indicates if the parent process generating the event is packaged with the MSIX technology |`ps.parent.is_packaged`|
100
+
| ps.parent.is_protected | Indicates if the parent process generating the event is a protected process |`ps.parent.is_protected`|
91
101
92
102
93
103
### Thread
@@ -100,11 +110,11 @@ The following tables summarize available field names that can be used in filter
100
110
| thread.kstack.limit | Limit of the thread's kernel space stack |`thread.kstack.limit = 'a85d800000'`|
101
111
| thread.ustack.base | Base address of the thread's user space stack |`thread.ustack.base = '7ffe0000'`|
102
112
| thread.ustack.limit | Limit of the thread's user space stack |`thread.ustack.limit = '8ffe0000'`|
103
-
| thread.entrypoint|Starting address of the function to be executed by the thread |`thread.entrypoint = '7efe0000'`|
113
+
| thread.start_address|Start address of the function to be executed by the thread |`thread.start_address = '7efe0000'`|
104
114
| thread.access.mask | Thread access rights |`thread.access.mask = '0x1800'`|
105
115
| thread.access.mask.names | Thread access human-readable rights |`thread.access.mask.names in ('QUERY_LIMITED_INFORMATION')`|
106
116
| thread.access.status | Thread access status |`thread.access.status = 'Success'`|
107
-
117
+
| thread.teb_address | The base address of the thread environment block |`thread.teb_address = '8f30893000'`|
108
118
109
119
### Callstack
110
120
| Field Name | Description | Example |
@@ -140,6 +150,7 @@ The following tables summarize available field names that can be used in filter
140
150
| image.is_dll | Indicates if the loaded image is a DLL |`image.is_dll`|
141
151
| image.is_driver | Indicates if the loaded image is a driver |`image.is_driver`|
142
152
| image.is_exec | Indicates if the loaded image is an executable |`image.is_exec`|
153
+
| image.is_dotnet | Indicates if the loaded image is a .NET assembly |`image.is_dotnet`|
143
154
144
155
### File
145
156
| Field Name | Description | Example |
@@ -162,7 +173,11 @@ The following tables summarize available field names that can be used in filter
162
173
| file.is_driver_vulnerable | Indicates if the dropped driver is vulnerable |`file.is_driver_vulnerable`|
163
174
| file.is_dll | Indicates if the created file is a DLL |`file.is_dll`|
164
175
| file.is_driver | Indicates if the created file is a driver |`file.is_driver`|
165
-
| file.is_exec | Indicates if the crated file is an executable |`file.is_exec`|
176
+
| file.is_exec | Indicates if the created file is an executable |`file.is_exec`|
177
+
| file.info_class | Identifies the file information class |`file.info_class = 'Allocation'`|
178
+
| file.info.allocation_size | Represents the file allocation size set via `NtSetInformationFile` syscall |`file.info.allocation_size > 645400`|
179
+
| file.info.eof_size | Represents the file EOF size set via `NtSetInformationFile` syscall |`file.info.eof_size > 1000`|
180
+
| file.info.is_disposition_file_delete | Indicates if the file is deleted when its handle is closed |`file.info.is_disposition_file_delete = true`|
166
181
167
182
168
183
### Registry
@@ -254,4 +269,3 @@ The following tables summarize available field names that can be used in filter
254
269
| pe.cert.before | PE certificate enrollment date |`pe.cert.before contains '2024-02-01 00:05:42 +0000 UTC'`|
255
270
| pe.is_modified | Indicates if on-disk and in-memory PE headers differ |`pe.is_modified'`|
256
271
| pe.is_modified | Indicates if on-disk and in-memory PE headers differ |`pe.is_modified'`|
257
-
| pe.ps.child.file.name | Original file name of the child process executable supplied at compile-time |`pe.ps.child.file.name = 'NOTEPAD.EXE'`|
0 commit comments