Add JSON output format support
This commit is contained in:
@@ -15,3 +15,5 @@ anyhow = "1.0"
|
||||
thiserror = "1.0"
|
||||
log = "0.4"
|
||||
env_logger = "0.11"
|
||||
serde = { version = "1.0", features = ["derive"] }
|
||||
serde_json = "1.0"
|
||||
|
||||
@@ -10,3 +10,5 @@ ghost-core = { path = "../ghost-core" }
|
||||
anyhow.workspace = true
|
||||
env_logger.workspace = true
|
||||
log.workspace = true
|
||||
serde.workspace = true
|
||||
serde_json.workspace = true
|
||||
|
||||
@@ -2,6 +2,7 @@ use anyhow::Result;
|
||||
use clap::{Arg, Command};
|
||||
use ghost_core::{memory, process, thread, DetectionEngine, ThreatLevel};
|
||||
use log::{debug, error, info, warn};
|
||||
use serde_json;
|
||||
use std::time::Instant;
|
||||
|
||||
fn main() -> Result<()> {
|
||||
@@ -190,32 +191,52 @@ fn main() -> Result<()> {
|
||||
info!("Scan completed: {} processes scanned, {} suspicious processes found", scanned_count, detections.len());
|
||||
|
||||
// Handle output
|
||||
let output_content = if detections.is_empty() {
|
||||
"No suspicious activity detected.".to_string()
|
||||
} else {
|
||||
let mut content = format!("Found {} suspicious processes:\n\n", detections.len());
|
||||
|
||||
for detection in detections {
|
||||
let level_str = match detection.threat_level {
|
||||
ThreatLevel::Suspicious => "SUSPICIOUS",
|
||||
ThreatLevel::Malicious => "MALICIOUS",
|
||||
_ => "CLEAN",
|
||||
};
|
||||
|
||||
content.push_str(&format!(
|
||||
"[{}] {} (PID: {}) - Confidence: {:.1}%\n",
|
||||
level_str,
|
||||
detection.process.name,
|
||||
detection.process.pid,
|
||||
detection.confidence * 100.0
|
||||
));
|
||||
|
||||
for indicator in &detection.indicators {
|
||||
content.push_str(&format!(" - {}\n", indicator));
|
||||
let output_content = match format.as_str() {
|
||||
"json" => {
|
||||
if detections.is_empty() {
|
||||
serde_json::json!({
|
||||
"status": "clean",
|
||||
"message": "No suspicious activity detected",
|
||||
"detections": []
|
||||
}).to_string()
|
||||
} else {
|
||||
serde_json::json!({
|
||||
"status": "suspicious",
|
||||
"message": format!("Found {} suspicious processes", detections.len()),
|
||||
"detections": &detections
|
||||
}).to_string()
|
||||
}
|
||||
}
|
||||
_ => {
|
||||
// Default table format
|
||||
if detections.is_empty() {
|
||||
"No suspicious activity detected.".to_string()
|
||||
} else {
|
||||
let mut content = format!("Found {} suspicious processes:\n\n", detections.len());
|
||||
|
||||
for detection in &detections {
|
||||
let level_str = match detection.threat_level {
|
||||
ThreatLevel::Suspicious => "SUSPICIOUS",
|
||||
ThreatLevel::Malicious => "MALICIOUS",
|
||||
_ => "CLEAN",
|
||||
};
|
||||
|
||||
content.push_str(&format!(
|
||||
"[{}] {} (PID: {}) - Confidence: {:.1}%\n",
|
||||
level_str,
|
||||
detection.process.name,
|
||||
detection.process.pid,
|
||||
detection.confidence * 100.0
|
||||
));
|
||||
|
||||
for indicator in &detection.indicators {
|
||||
content.push_str(&format!(" - {}\n", indicator));
|
||||
}
|
||||
content.push('\n');
|
||||
}
|
||||
content
|
||||
}
|
||||
content.push('\n');
|
||||
}
|
||||
content
|
||||
};
|
||||
|
||||
if let Some(output_path) = output_file {
|
||||
|
||||
@@ -5,16 +5,17 @@ use crate::{
|
||||
};
|
||||
#[cfg(target_os = "linux")]
|
||||
use crate::EbpfDetector;
|
||||
use serde::{Deserialize, Serialize};
|
||||
use std::collections::HashMap;
|
||||
|
||||
#[derive(Debug, Clone, Copy, PartialEq, Eq)]
|
||||
#[derive(Debug, Clone, Copy, PartialEq, Eq, Serialize, Deserialize)]
|
||||
pub enum ThreatLevel {
|
||||
Clean,
|
||||
Suspicious,
|
||||
Malicious,
|
||||
}
|
||||
|
||||
#[derive(Debug, Clone)]
|
||||
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||
pub struct DetectionResult {
|
||||
pub process: ProcessInfo,
|
||||
pub threat_level: ThreatLevel,
|
||||
|
||||
@@ -1,5 +1,6 @@
|
||||
use std::collections::HashMap;
|
||||
use std::time::{SystemTime, Duration};
|
||||
use serde::{Deserialize, Serialize};
|
||||
use crate::{ProcessInfo, MemoryRegion, ThreadInfo, MemoryProtection};
|
||||
|
||||
/// Advanced Evasion Detection Module
|
||||
@@ -11,7 +12,7 @@ pub struct EvasionDetector {
|
||||
obfuscation_detector: ObfuscationDetector,
|
||||
}
|
||||
|
||||
#[derive(Debug, Clone)]
|
||||
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||
pub struct EvasionResult {
|
||||
pub evasion_techniques: Vec<EvasionTechnique>,
|
||||
pub confidence: f32,
|
||||
@@ -19,7 +20,7 @@ pub struct EvasionResult {
|
||||
pub anti_analysis_indicators: Vec<String>,
|
||||
}
|
||||
|
||||
#[derive(Debug, Clone)]
|
||||
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||
pub struct EvasionTechnique {
|
||||
pub technique_name: String,
|
||||
pub mitre_id: String,
|
||||
@@ -29,7 +30,7 @@ pub struct EvasionTechnique {
|
||||
pub severity: EvasionSeverity,
|
||||
}
|
||||
|
||||
#[derive(Debug, Clone, PartialEq)]
|
||||
#[derive(Debug, Clone, PartialEq, Serialize, Deserialize)]
|
||||
pub enum EvasionSeverity {
|
||||
Low, // Basic evasion attempts
|
||||
Medium, // Moderate sophistication
|
||||
|
||||
@@ -1,6 +1,7 @@
|
||||
use serde::{Deserialize, Serialize};
|
||||
use std::fmt;
|
||||
|
||||
#[derive(Debug, Clone)]
|
||||
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||
pub struct ProcessInfo {
|
||||
pub pid: u32,
|
||||
pub ppid: u32,
|
||||
|
||||
@@ -38,7 +38,7 @@ pub enum IocType {
|
||||
Mutex,
|
||||
}
|
||||
|
||||
#[derive(Debug, Clone)]
|
||||
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||
pub struct ThreatContext {
|
||||
pub matched_iocs: Vec<IndicatorOfCompromise>,
|
||||
pub threat_actor: Option<ThreatActor>,
|
||||
|
||||
Reference in New Issue
Block a user