auditd
laurel
auditd | laurel | |
---|---|---|
9 | 7 | |
1,364 | 645 | |
- | 0.3% | |
5.8 | 8.9 | |
13 days ago | 11 days ago | |
Rust | ||
Apache License 2.0 | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
auditd
-
The Linux Process Journey - “kauditd”
Lastly, by using the “Linux Auditing System” the system administrator can investigate what happens in the system for the purpose of debugging or in case of a security incident. We can also use the “auditctl” utility get/add/delete rules as part of Linux's kernel audit system (https://linux.die.net/man/8/auditctl). Also, there are great examples for “audit.rules” in GitHub (one example is https://github.com/Neo23x0/auditd/blob/master/audit.rules).
-
Looking for inputs and validation for this network setup.
2) There are many opensource solutions, and you hit on all the important ones. Think creativitly, and test all your controls. hit your boxes with Metaspoilt and atomic redteam. These tools will help you verify that you have the proper controls in place, and that you are able to detect attacks (successful, and failed). Run auditd with Florian Roth's rule set on your linux boxes (https://github.com/Neo23x0/auditd/blob/master/audit.rules ), and sysmon (https://github.com/olafhartong/sysmon-modular) on windows.
-
Top 5 logs to ingest into Splunk
Linux: AuditD with customized configurations script for your environment
-
help needed: auditd rules for general purpose vps
However, the auditd repo from Florian Roth is like a golden standard for auditd config.
- How to forward syslog event related to CMDs done by none root user
- New blue team
-
Alerts Log Broken
Enabled auditd - with the rules from - https://github.com/Neo23x0/auditd
-
Splunk App for Unix and Linux
I don't think that the addon can do this for you. But, as a good start, check out Florian Roths auditd config (https://github.com/Neo23x0/auditd).
- Sysmon on Linux
laurel
-
help needed: auditd rules for general purpose vps
If you combine it with laurel, you can have a enriched logs upon what auditd provides.
- laurel: Transform Linux Audit logs for SIEM usage - LAUREL is an event post-processing plugin for auditd(8) to improve its usability in modern security monitoring setups.
- Linux Audit – Usable, Robust, Easy Logging (Laurel) - the event multiplexor plugin for auditd - Has added an optional field which is a concatenation of the command line for a process
- GitHub - threathunters-io/laurel: Transform Linux Audit logs for SIEM usage
- Transform Linux Audit logs for SIEM usage
- LAUREL solves audit's problems by consuming audit events, parsing and transforming them into more data and writing them out as a JSON-based log format, while keeping all information intact that was part of the original audit log
- Practical auditd(8) problems
What are some alternatives?
sysmon-modular - A repository of sysmon configuration modules
espanso - Cross-platform Text Expander written in Rust
velociraptor - Digging Deeper....
tokei - Count your code, quickly.
PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
alacritty - A cross-platform, OpenGL terminal emulator.
RedEye - RedEye is a visual analytic tool supporting Red & Blue Team operations
rustdesk - An open-source remote desktop, and alternative to TeamViewer.
AtomicPurpleTeam - Atomic Purple Team Framework and Lifecycle
alacritty - A cross-platform, OpenGL terminal emulator. [Moved to: https://github.com/alacritty/alacritty]
TheHive - TheHive: a Scalable, Open Source and Free Security Incident Response Platform
auditd-attack - A Linux Auditd rule set mapped to MITRE's Attack Framework