Skip to content

techathena/hellhound

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

alt text

Application Whitelisting and Hellhound

We all have heard of blacklisting .Stuff we do with firewalls.Right?So, What is application whitelisting?

Well, lets understand with and example.Say we have a network,we allow traffic from all addresses to enter it,and then block a few addresses ,then it is called blacklisting.Similarly if we block all traffic and allow only specific addresses in the network ,its called whitelisting.

So what is Application whitelisting?

Again think you have a company,and your employees work on company systems,suppose all files can be exexcuted by default ,then it is possible that a malicious file can execute,since your antivirus is only blocking malicious applications from its database.Right?So we can implement an application whitelist and allow only specified applications to run.

Okay then what is hellhound?

Well,i could not find many open source projects on application whitelisting.So i developed hellhound which is a prototype to implement application whitelisting in systems.

hellhound

an application whitlisting solution . This is a prototype.further development on this project is in process

Scope:

All the Endpoints in an IT infrastructure to be covered with centralized management.

Requirement Specifications:

  • To Ensure that all the Endpoints are having Application whitelisting enabled and no illegitimate application/process is allowed to run
  • To provide a centralized dashboard for generating alerts on the illegitimate process/application tried to run
  • To manage the application whitelistings including exceptions through same centralized dashboard.

Solution Proposed:

The solution is designed with following approach: i) Open Source OSQUERY Framework+ (OSQUERY d/ OSQUERY CTL) to be installed on a Central Server ii) Integration with host systems having different Operating Systems will be done iii) Information from different systems will be collected in database iv) Using OSQUERY Extension and Python – to develop a functionality to disallow execution of non-whitelisted application

Technichal Details:

  • Installing OSQUERY d and OSQUERY CTL on UBUNTU
  • Python and Python development tools
  • MYSQL

Usefulness:

The project derives its ultimate benefit in zero day protection and in monitoring of the real time system state.

Market Potential:

Monitoring of System state/attributes is essential for any Cyber Security product and as such various organizations are looking at these types of solutions which gives granular controls on the applications and processes. Last word and future development : The solution is powerful and has potential of extending it to integrate with various security technologies to provide automated responses on complex IOCs (Indicators of compromise).

Releases

No releases published

Packages

No packages published

Languages