EyeON is a CLI tool that allows users to get software data pertaining to their machines by performing threat and inventory analysis. It can be used to quickly generate manifests of installed software or potential firmare patches. These manifests are then submitted to a database and LLNL can use them to continuously monitor OT software for threats.
Validation is important when installing new software. Existing tools use a hash/signature check to validate that the software has not been tampered. Knowing that the software works as intended saves a lot of time and energy, but just performing these hash/signature checks doesn't provide all the information needed to understand supply chain threats.
EyeON provides an automated, consistent process across users to scan software files used for operational technologies. Its findings can be used to generate reports that track software patterns, shedding light on supply chain risks. This tool's main capabilities are focused on increasing the visibility of OT software landscape.
Eyeon can also be run in linux or WSL.
The simplest install can be done with pip
:
pip install peyeon
However, this does not install several key dependencies, namely libmagic
, ssdeep
, and tlsh
. A better way to install is via the container or install scripts on the github page.
This dockerfile contains all the pertinent tools specific to data extraction. The main tools needed are ssdeep
, libmagic
, tlsh
, and detect-it-easy
. We have written some convenient scripts:
wget https://github.com/LLNL/pEyeON/blob/main/docker-build.sh \
https://github.com/LLNL/pEyeON/blob/main/docker-run.sh \
https://github.com/LLNL/pEyeON/blob/main/eyeon.Dockerfile
chmod +x docker-build.sh && ./docker-build.sh
chmod +x docker-run.sh && ./docker-run.sh
This attaches the current directory as a working directory in the container. Files that need to be scanned should go in "tests" folder. If running in a docker container, the eyeon root directory is mounted to "/workdir", so place samples in "/workdir/samples" or "/workdir/tests/samples".
Cd into workdir directory:
cd workdir
EyeON commands should work now.
Alternatively, to install on a clean Ubuntu VM:
wget https://github.com/LLNL/pEyeON/blob/main/install-ubuntu.sh
chmod +x install-ubuntu.sh && ./install-ubuntu.sh
To request other options for install, please create an issue on our GitHub page.
This section shows how to run the CLI component.
- Displays all arguments
eyeon --help
- Displays observe arguments
eyeon observe --help
- Displays parse arguments
eyeon parse --help
EyeON consists of two parts - an observe call and a parse call. observe.py
works on a single file to return a suite of identifying metrics, whereas parse.py
expects a folder. Both of these can be run either from a library import or a CLI command.
- This CLI command calls the
observe
function and makes an observation of a file.
CLI command:
eyeon observe demo.ipynb
Init file calls observe function in observe.py
obs = eyeon.observe.Observe("demo.ipynb")
The observation will create a json file containing unique identifying information such as hashes, modify date, certificate info, etc.
Example json file:
{
"bytecount": 9381,
"filename": "demo.ipynb",
"signatures": {"valid": "N/A"},
"imphash": "N/A",
"magic": "JSON text data",
"modtime": "2023-11-03 20:21:20",
"observation_ts": "2024-01-17 09:16:48",
"permissions": "0o100644",
"md5": "34e11a35c91d57ac249ff1300055a816",
"sha1": "9388f99f2c05e6e36b279dc2453ebea4bdc83242",
"sha256": "fa95b3820d4ee30a635982bf9b02a467e738deaebd0db1ff6a262623d762f60d",
"ssdeep": "96:Ui7ooWT+sPmRBeco20zV32G0r/R4jUkv57nPBSujJfcMZC606/StUbm/lGMipUQy:U/pdratRqJ3ZHStx4UA+I1jS"
}
parse.py
calls observe
recursively, returning an observation for each file in a directory.
obs = eyeon.parse.Parse(args.dir)
If you want to run jupyter, the ./docker-run.sh
script exposes port 8888. Launch it from the /workdir
or eyeon root directory via jupyter notebook --ip=0.0.0.0 --no-browser
and open the demo.ipynb
notebook for a quick demonstration.
In the src
directory, there exist the bones of a data exploration applet. To generate data for this, add the database flag like eyeon parse -d tests/data/20240925-eyeon/dbhelpers/20240925-eyeon.db
. Then, if necessary, update the database path variable in the src/streamlit/eyeon_settings.toml
. Note that the path needs to point to the grandparent directory of the dbhelpers
directory. This is a specific path for the streamlit app; the streamlit directory has more information in its own README.
There will be a second part to this project, which will be to develop a cloud application that anonymizes and summarizes the findings to enable OT security analysis.
SPDX-License-Identifier: MIT