Author: iwmvictor
Website: iwmvictor.vercel.app
Email: iwmvik@gmail.com
Repository: GitHub
- Introduction
- How It Works
- Features
- Requirements
- Installation & Setup
- Usage
- Customization
- Security Considerations
- Troubleshooting
- Contributing
- License
Incident Response Automation (IRA) is a powerful tool designed to help security teams automate the containment of compromised systems during an active security incident. By leveraging firewall rules (iptables
or nftables
), the script isolates affected machines to prevent further spread of a cyber attack.
This script is ideal for:
- Security professionals handling active threats.
- System administrators managing corporate networks.
- Cybersecurity researchers testing response techniques.
- Identifies the target IP address of the compromised system.
- Blocks all incoming and outgoing traffic for that IP using either
iptables
ornftables
. - Logs the action for auditing and future incident analysis.
- Allows removal of isolation when the threat is mitigated.
✅ Automated system isolation with firewall rules
✅ Supports both iptables
and nftables
✅ Logging for auditing and forensic analysis
✅ Easy to integrate with incident response workflows
✅ Simple command-line usage
- Linux-based OS (Debian, Ubuntu, CentOS, etc.)
- Python 3.x
- Root privileges to modify firewall rules
- iptables or nftables installed
- Clone the repository:
git clone https://github.com/iwmvictor/ira.git
- Navigate to the project directory:
cd ira
- Ensure execution permissions:
chmod +x isolate.py isolate.sh
To isolate a system by its IP address:
sudo python3 isolate.py isolate <IP_ADDRESS>
Example:
sudo python3 isolate.py isolate 192.168.1.100
To remove isolation:
sudo python3 isolate.py remove <IP_ADDRESS>
Example:
sudo python3 isolate.py remove 192.168.1.100
To isolate a system:
sudo ./isolate.sh isolate <IP_ADDRESS>
To remove isolation:
sudo ./isolate.sh remove <IP_ADDRESS>
- Modify the script to use UFW or firewalld if your system prefers those over
iptables
. - Add email notifications or Slack alerts upon isolation.
- Extend logging capabilities to integrate with SIEM solutions.
- Permission Denied: Run the script with
sudo
. - iptables/nftables not found: Install using:
sudo apt install iptables # Debian/Ubuntu sudo yum install iptables # CentOS/RHEL
- Firewall rules not applying: Verify with:
sudo iptables -L -v -n
- No logging output: Ensure the script has write permissions to log files.
Contributions are welcome! Feel free to open issues, suggest improvements, or submit pull requests.
This project is licensed under the MIT License. See the LICENSE file for details.