198 lines
6.3 KiB
Python
198 lines
6.3 KiB
Python
#!/usr/bin/python
|
|
# -*- coding: utf-8 -*-
|
|
#
|
|
# Copyright 2013 The Plaso Project Authors.
|
|
# Please see the AUTHORS file for details on individual authors.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
"""Parser for Windows Firewall Log file."""
|
|
|
|
import logging
|
|
|
|
import pyparsing
|
|
|
|
from plaso.events import time_events
|
|
from plaso.lib import eventdata
|
|
from plaso.lib import timelib
|
|
from plaso.parsers import manager
|
|
from plaso.parsers import text_parser
|
|
|
|
import pytz
|
|
|
|
|
|
class WinFirewallParser(text_parser.PyparsingSingleLineTextParser):
|
|
"""Parses the Windows Firewall Log file.
|
|
|
|
More information can be read here:
|
|
http://technet.microsoft.com/en-us/library/cc758040(v=ws.10).aspx
|
|
"""
|
|
|
|
NAME = 'winfirewall'
|
|
DESCRIPTION = u'Parser for Windows Firewall Log files.'
|
|
|
|
# TODO: Add support for custom field names. Currently this parser only
|
|
# supports the default fields, which are:
|
|
# date time action protocol src-ip dst-ip src-port dst-port size
|
|
# tcpflags tcpsyn tcpack tcpwin icmptype icmpcode info path
|
|
|
|
# Define common structures.
|
|
BLANK = pyparsing.Literal('-')
|
|
WORD = pyparsing.Word(pyparsing.alphanums + '-') | BLANK
|
|
INT = pyparsing.Word(pyparsing.nums, min=1) | BLANK
|
|
IP = (
|
|
text_parser.PyparsingConstants.IPV4_ADDRESS |
|
|
text_parser.PyparsingConstants.IPV6_ADDRESS | BLANK)
|
|
PORT = pyparsing.Word(pyparsing.nums, min=1, max=6) | BLANK
|
|
|
|
# Define how a log line should look like.
|
|
LOG_LINE = (
|
|
text_parser.PyparsingConstants.DATE.setResultsName('date') +
|
|
text_parser.PyparsingConstants.TIME.setResultsName('time') +
|
|
WORD.setResultsName('action') + WORD.setResultsName('protocol') +
|
|
IP.setResultsName('source_ip') + IP.setResultsName('dest_ip') +
|
|
PORT.setResultsName('source_port') + INT.setResultsName('dest_port') +
|
|
INT.setResultsName('size') + WORD.setResultsName('flags') +
|
|
INT.setResultsName('tcp_seq') + INT.setResultsName('tcp_ack') +
|
|
INT.setResultsName('tcp_win') + INT.setResultsName('icmp_type') +
|
|
INT.setResultsName('icmp_code') + WORD.setResultsName('info') +
|
|
WORD.setResultsName('path'))
|
|
|
|
# Define the available log line structures.
|
|
LINE_STRUCTURES = [
|
|
('comment', text_parser.PyparsingConstants.COMMENT_LINE_HASH),
|
|
('logline', LOG_LINE),
|
|
]
|
|
|
|
DATA_TYPE = 'windows:firewall:log_entry'
|
|
|
|
def __init__(self):
|
|
"""Initializes a parser object."""
|
|
super(WinFirewallParser, self).__init__()
|
|
self.version = None
|
|
self.use_local_zone = False
|
|
self.software = None
|
|
|
|
def VerifyStructure(self, parser_context, line):
|
|
"""Verify that this file is a firewall log file.
|
|
|
|
Args:
|
|
parser_context: A parser context object (instance of ParserContext).
|
|
line: A single line from the text file.
|
|
|
|
Returns:
|
|
True if this is the correct parser, False otherwise.
|
|
"""
|
|
# TODO: Examine other versions of the file format and if this parser should
|
|
# support them.
|
|
if line == '#Version: 1.5':
|
|
return True
|
|
|
|
return False
|
|
|
|
def ParseRecord(self, parser_context, key, structure):
|
|
"""Parse each record structure and return an event object if applicable.
|
|
|
|
Args:
|
|
parser_context: A parser context object (instance of ParserContext).
|
|
key: An identification string indicating the name of the parsed
|
|
structure.
|
|
structure: A pyparsing.ParseResults object from a line in the
|
|
log file.
|
|
|
|
Returns:
|
|
An event object (instance of EventObject) or None.
|
|
"""
|
|
if key == 'comment':
|
|
self._ParseCommentRecord(structure)
|
|
elif key == 'logline':
|
|
return self._ParseLogLine(parser_context, structure)
|
|
else:
|
|
logging.warning(
|
|
u'Unable to parse record, unknown structure: {0:s}'.format(key))
|
|
|
|
def _ParseCommentRecord(self, structure):
|
|
"""Parse a comment and store appropriate attributes.
|
|
|
|
Args:
|
|
structure: A pyparsing.ParseResults object from a line in the
|
|
log file.
|
|
"""
|
|
comment = structure[1]
|
|
if comment.startswith('Version'):
|
|
_, _, self.version = comment.partition(':')
|
|
elif comment.startswith('Software'):
|
|
_, _, self.software = comment.partition(':')
|
|
elif comment.startswith('Time'):
|
|
_, _, time_format = comment.partition(':')
|
|
if 'local' in time_format.lower():
|
|
self.use_local_zone = True
|
|
|
|
def _ParseLogLine(self, parser_context, structure):
|
|
"""Parse a single log line and return an event object.
|
|
|
|
Args:
|
|
parser_context: A parser context object (instance of ParserContext).
|
|
structure: A pyparsing.ParseResults object from a line in the
|
|
log file.
|
|
|
|
Returns:
|
|
An event object (instance of EventObject) or None.
|
|
"""
|
|
log_dict = structure.asDict()
|
|
|
|
date = log_dict.get('date', None)
|
|
time = log_dict.get('time', None)
|
|
|
|
if not (date and time):
|
|
logging.warning(u'Unable to extract timestamp from Winfirewall logline.')
|
|
return
|
|
|
|
year, month, day = date
|
|
hour, minute, second = time
|
|
if self.use_local_zone:
|
|
zone = parser_context.timezone
|
|
else:
|
|
zone = pytz.utc
|
|
|
|
timestamp = timelib.Timestamp.FromTimeParts(
|
|
year, month, day, hour, minute, second, timezone=zone)
|
|
|
|
if not timestamp:
|
|
return
|
|
|
|
# TODO: refactor this into a WinFirewall specific event object.
|
|
event_object = time_events.TimestampEvent(
|
|
timestamp, eventdata.EventTimestamp.WRITTEN_TIME, self.DATA_TYPE)
|
|
|
|
for key, value in log_dict.items():
|
|
if key in ('time', 'date'):
|
|
continue
|
|
if value == '-':
|
|
continue
|
|
|
|
if type(value) is pyparsing.ParseResults:
|
|
print value
|
|
setattr(event_object, key, ''.join(value))
|
|
else:
|
|
try:
|
|
save_value = int(value)
|
|
except ValueError:
|
|
save_value = value
|
|
|
|
setattr(event_object, key, save_value)
|
|
|
|
return event_object
|
|
|
|
|
|
manager.ParsersManager.RegisterParser(WinFirewallParser)
|