Skip to content

Framework for generating audit commands for Unix security audits

License

Notifications You must be signed in to change notification settings

CiscoCXSecurity/unix-audit

unix-audit

Framework for generating audit commands for Unix security audits.

unix-audit allows you to maintain a list of commands in markdown (.md) format, then generate audit scripts from those markdown pages. You can view the markdown database files here. Feel free to maintain your own database of checks or to contribute back to this public repository (also see contributing).

You can optionally tag your commands (or whole sections of commands) to enable generation of scripts that contain only a subset of your checks database. This can be useful if you need to perform different types of audit (e.g. you might have a normal security audit, a bug-hunting audit, a privilege escalation check, checks for detective controls, checks for exposed secrets, commands that help you collect data for graphing, a quick audit, a slow audit, audits that generate extra files, audits that don't generate extra files, etc.)

The markdown database format allows the use of comments - in fact only code blocks and titles are used during script generation, everything else is ignored. This can help to document your commands for users.

The markdown format (parsed or unparsed) can also make it easier to identify gaps in your scripts - e.g. maybe your Solaris audits don't include commands for all the checks performed on Linux. Gaps can be more difficult to find if you only maintain source code.

Quick Start

unix-audit can generate shell scripts containing the commands you want to run on the target system:

python3 unix-audit.py generate ./checks-database/ linux all > audit-scripts/linux-audit.sh
python3 unix-audit.py generate ./checks-database/ solaris all > audit-scripts/solaris-audit.sh
python3 unix-audit.py generate ./checks-database/ aix all > audit-scripts/aix-audit.sh
python3 unix-audit.py generate ./checks-database/ linux exploit-mitigation,software-installed > audit-scripts/smaller-audit.sh

You can get a list of supported platforms and available tags by specifying using "list" mode:

$ python3 unix-audit.py list ./checks-database/
...
Available platforms: aix, linux, solaris
Available tags: network-stack-tuning, logging, privilege-escalation, file-permissions, exploit-mitigation, authentication, resource-limits, access-control, common-services, networking, cryptography, environment, software-installed, informational, important-file-locations

Upload the script to the target system (e.g. scp or copy-paste), run it and collect the output, e.g.

# sh audit.sh > audit-output.sh

Then copy the output file back to your own systems for analysis.

The public version of unix-audit doesn't analyze data, it just collects it. We hope to add a feature for analyzing collected data too in future.

Usage

Usage: unix-audit.py mode args

Modes:
 python3 unix-audit.py list <database-dir>
 python3 unix-audit.py generate <database-dir> <platform-tag> <other-tag,other-tag,...>
 python3 unix-audit.py compare <database-dir> <platform-tag1> <platform-tag2> <other-tag,other-tag,...>

List mode - lists the platforms and tags available for other modes.  Examples:

 python3 unix-audit.py list ./checks-database/

Generate mode - used to generate an audit script from md files.  Examples:

 python3 unix-audit.py generate ./checks-database/ linux all > audit-scripts/linux-audit.sh
 python3 unix-audit.py generate ./checks-database/ aix all > audit-scripts/aix-audit.sh
 python3 unix-audit.py generate ./checks-database/ solaris all > audit-scripts/solaris-audit.sh

Compare mode - find differences in commands for 2 or more platforms.  Examples:

 python unix-audit.py compare ./checks-database/ all all > compare/comparison.md
 python3 unix-audit.py compare ./checks-database/ linux,solaris > linux-solaris-compare.md
 python3 unix-audit.py compare ./checks-database/ all authentication,logging > linux-solaris-compare.md

List mode:

$ python3 unix-audit.py list ./checks-database/
Available platforms: solaris, aix, linux
Available tags: important-file-locations, informational, authentication, software-installed, logging, resource-limits, networking, exploit-mitigation, cryptography, network-stack-tuning, file-permissions, environment, access-control, privilege-escalation, common-services

What is unix-audit used for?

unix-audit is mostly used by Cisco's offensive security testing teams (penetration testers and red teamers) to collect information from systems they are asked to audit. The collected data is parsed and analysed offline and ultimately used to generate details of security weakenesses and corresponding recommendations for customers. The depth of such audits can be fairly extensive for Build Review type activities. Conversely, it can be fairly light for ad-hoc checks for compromised systems during penetration tests.

Analysis tools for parsing have not been released publicly at the time of writing (although you can check out sudo-parser if that's of interest).

There are lots of other use-cases and potential use-cases too, e.g.

  • Supporting password strength audits (collecting shadow files or similar)
  • Supporting the graphing of SSH trust relationships
  • Bug hunting for a particular class of security vulnerability (we like finding RPATH vulnerabilities)
  • Searching for exposed secrets in home directories

If you have commands that your team needs to run on customer systems, it should be easy to adapt for your use-case too.

Also check out unix_collector which is maintained by Cisco's teams that focus on detection and response.

How to update commands / scripts

To update the checks-database, just go ahead and edit the markdown files - using the github editor or your preferred markdown editor.

After updating the checks database, any existing scripts will be out of date and you'll need to regenerate them.

To "compile", use the unix-audit.py in "generate" mode as directed above.

Tips on running audit scripts

Remember the following when running audit scripts:

  • Collect the output from your script by redirecting output, using "script", "tee" or somethign similar.
  • Commands in the checks database generally don't create files, but some do. So run in a clean directory so you can easily identify any other created files that you may want to retrieve at the end of the audit.
  • Don't fill up the disk partition. Your script might run for a long time and generate a lot of output. Check there's plenty of disk space before you start.
  • Be considerate about degrading system performance. Some commands can use a lot of CPU or disk I/O. In practice we haven't noticed problems. But if you were to audit 100 systems simultaneously and they all shared a resource (e.g. hypervisor/SAN), you might run into problems.
  • Tidy up after yourself and avoid leaving sensitive data lying around.

How to check for gaps in your scripts

If one of the platforms you audit (e.g. AIX) had less checks than another platform (e.g. Linux), how would you know? unix-audit seeks to address this in two ways:

  • Encourage the writing of markdown files in a common format (and each team can choose a format that works for them). This supports manual side-by-side comparison of docs for two different platforms.
  • Using a markdown parser to compare checks for two different platforms.

Use unix-audit in compare mode to identify checks (markdown titles) that exist for one platform but not another:

unix-audit.py compare ./checks-database/ linux solaris

See comparison.md for example output.

About

Framework for generating audit commands for Unix security audits

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •