Comments (4)
Hey @meirwah, right now providing examples in Go would be helpful, but is not a priority. If you want to see our examples in other languages, see our examples here: https://developers.facebook.com/docs/threat-exchange/examples/v2.5
Even better, if you would like to write the Go examples, I can add them to that page :)
from threatexchange.
I noticed the documented examples use v2.4 as well as threat_indicators to query for the first two examples. Should those get updated to v2.5 and using threat_descriptors?
I have never written Go before, so I apologize if any of this is over-engineered or there's better ways to do this :)
Example 1: A query to get all threat descriptors which are IP Addresses of proxies in ThreatExchange.
package main
import (
"bytes"
"encoding/json"
"fmt"
"io/ioutil"
"net/http"
"net/url"
)
func main() {
var app_id = "555"
var app_secret = "1234"
var type_ = "IP_ADDRESS"
var text = "proxy"
var buffer bytes.Buffer
buffer.WriteString(app_id)
buffer.WriteString("|")
buffer.WriteString(app_secret)
access_token := buffer.String()
var Url *url.URL
Url, err := url.Parse("https://graph.facebook.com")
Url.Path += "/v2.5/threat_descriptors/"
parameters := url.Values{}
parameters.Add("access_token", access_token)
parameters.Add("type", type_)
parameters.Add("text", text)
Url.RawQuery = parameters.Encode()
res, err := http.Get(Url.String())
if err != nil {
panic(err)
}
result, err := ioutil.ReadAll(res.Body)
res.Body.Close()
if err != nil {
panic(err)
}
var dat map[string] interface{}
if err := json.Unmarshal(result, &dat); err != nil {
panic(err)
}
p, err := json.MarshalIndent(dat, "", " ")
if err != nil {
panic(err)
}
fmt.Print(string(p))
}
Example 2: A query to get all IP Addresses of proxies uploaded by the Facebook Administrator app in ThreatExchange.
package main
import (
"bytes"
"encoding/json"
"fmt"
"io/ioutil"
"net/http"
"net/url"
)
func main() {
var app_id = "555"
var app_secret = "1234"
var owner_app_id = "820763734618599"
var type_ = "IP_ADDRESS"
var text = "proxy"
var buffer bytes.Buffer
buffer.WriteString(app_id)
buffer.WriteString("|")
buffer.WriteString(app_secret)
access_token := buffer.String()
var Url *url.URL
Url, err := url.Parse("https://graph.facebook.com")
Url.Path += "/v2.5/threat_descriptors/"
parameters := url.Values{}
parameters.Add("access_token", access_token)
parameters.Add("owner_app_id", owner_app_id)
parameters.Add("type", type_)
parameters.Add("text", text)
Url.RawQuery = parameters.Encode()
res, err := http.Get(Url.String())
if err != nil {
panic(err)
}
result, err := ioutil.ReadAll(res.Body)
res.Body.Close()
if err != nil {
panic(err)
}
var dat map[string] interface{}
if err := json.Unmarshal(result, &dat); err != nil {
panic(err)
}
p, err := json.MarshalIndent(dat, "", " ")
if err != nil {
panic(err)
}
fmt.Print(string(p))
}
Example 3: A query to get all malware analyses uploaded to ThreatExchange uploaded between Fri, 07 Feb 2014 22:51:29 GMT and Sat, 08 Feb 2014 10:51:29 GMT.
package main
import (
"bytes"
"encoding/json"
"fmt"
"io/ioutil"
"net/http"
"net/url"
)
func main() {
var app_id = "555"
var app_secret = "1234"
var start_time = "1391813489"
var end_time = "1391856689"
var buffer bytes.Buffer
buffer.WriteString(app_id)
buffer.WriteString("|")
buffer.WriteString(app_secret)
access_token := buffer.String()
var Url *url.URL
Url, err := url.Parse("https://graph.facebook.com")
Url.Path += "/v2.5/malware_analyses/"
parameters := url.Values{}
parameters.Add("access_token", access_token)
parameters.Add("since", start_time)
parameters.Add("until", end_time)
Url.RawQuery = parameters.Encode()
res, err := http.Get(Url.String())
if err != nil {
panic(err)
}
result, err := ioutil.ReadAll(res.Body)
res.Body.Close()
if err != nil {
panic(err)
}
var dat map[string] interface{}
if err := json.Unmarshal(result, &dat); err != nil {
panic(err)
}
p, err := json.MarshalIndent(dat, "", " ")
if err != nil {
panic(err)
}
fmt.Print(string(p))
}
Example 4: A query to get all malware families uploaded to ThreatExchange between yesterday and today.
package main
import (
"bytes"
"encoding/json"
"fmt"
"io/ioutil"
"net/http"
"net/url"
)
func main() {
var app_id = "555"
var app_secret = "1234"
var start_time = "yesterday"
var end_time = "now"
var buffer bytes.Buffer
buffer.WriteString(app_id)
buffer.WriteString("|")
buffer.WriteString(app_secret)
access_token := buffer.String()
var Url *url.URL
Url, err := url.Parse("https://graph.facebook.com")
Url.Path += "/v2.5/malware_analyses/"
parameters := url.Values{}
parameters.Add("access_token", access_token)
parameters.Add("since", start_time)
parameters.Add("until", end_time)
Url.RawQuery = parameters.Encode()
res, err := http.Get(Url.String())
if err != nil {
panic(err)
}
result, err := ioutil.ReadAll(res.Body)
res.Body.Close()
if err != nil {
panic(err)
}
var dat map[string] interface{}
if err := json.Unmarshal(result, &dat); err != nil {
panic(err)
}
p, err := json.MarshalIndent(dat, "", " ")
if err != nil {
panic(err)
}
fmt.Print(string(p))
}
from threatexchange.
@mgoffin Thanks a lot for the examples!!!
And thanks @motiwarifacebook for the response ...
from threatexchange.
Awesome, @mgoffin !
@meirwah, is it ok if we close this one out?
from threatexchange.
Related Issues (20)
- [py-tx] ThreatExchange checkpoint time implementation is incorrect, potentially skipping updates HOT 2
- [py-tx] Investigate dbm as a replacement for the default store
- /matches/for-hash/ returns 400, could not parse request HOT 9
- [hma] Clicking Sync button on the webui doesn't do anything
- [py-tx] New extension interface for storage
- [py-ty] Venv setup documentation and/or files
- [hma] Cleanup Settings > ThreatExchange Tab
- [hma] 500 error thrown on invalid PDQ hash HOT 1
- [HMA] graph API 9.0 hardcoded, now deprecated HOT 1
- [py-tx][HMA-in-a-bottle] Modularising py-tx -- Draft roadmap HOT 6
- [hma] Fetcher policy fails to access index HOT 1
- [hma] submitting content gets stuck between "hashed" and "matched" HOT 2
- /matches/for-hash/ gives AttributeError: 'IndexMatchUntyped' object has no attribute 'distance' HOT 1
- [pytx] No match results if creating a local_file with only 1 hash in it HOT 1
- [hma] Size of hashkey has exceeded the maximum size limit of 2048 bytes HOT 3
- [hma] ValueError in indexer
- [vpdq] Add support for Windows in vpdq pypy package HOT 5
- [OMM] Set up basic Continuous Integration git workflows for OMM HOT 2
- [omm] Figure out design for background tasks HOT 5
- [hma] Test production deployment - Nice-to-haves and Need-to-haves HOT 4
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from threatexchange.