sudo apt install -y lynis
sudo lynis audit system
- Automated security auditing
- Compliance testing (e.g. ISO27001, PCI-DSS, HIPAA)
- Vulnerability detection
- Configuration and asset management
- Software patch management
- System hardening
- Penetration testing (privilege escalation)
- Intrusion detection
Audiences
- System administrators
- Auditors
- Security professionals
-
Host install Download scripts from linked repo!!
-
Also install with Anisble and other methods.
Quizá fuese posible posible recuperar las respuestas por medio de ARP spoofing en LAN. Además, sería necesario otra regla de iptables de forward para rebotar a localhost las tramas destinadas a la IP falsificada.
Address Spoofing with iptables in Linux
Different testing techniques with Apache JMeter.
- Site Spidering
- Regular Expression Extractor
- XPath Extractor
- CSS/JQuery Extractor
- HTML Link Parser
- Fuzzing
- DDoS
Blazemeter - How To Do Security Testing With JMeter
Interestingly, it does not use a blocklist, instead, it cleverly greps out the path.
Read here Sanitize user input User input validation
Apple's Guide to shell script security
Automatic scan for logs:
sudo apt install logcheck
sudo -u logcheck logcheck -o -t
sudo apt-cache show [PACKAGE_NAME]
Msfvenom can be used to export Metasploits' payloads.
-
In the following cheatsheet, we can find binaries and payload examples for meterpreter and other reverse shells.
-
In this other article, we can find some parameters to adjust the formats and platforms for the exported payloads
-
This other article analyzes metasploit shellcodes at low level
How to convert shellcode to readable assembly code/instructions?
openssl enc -cipher [-help] [-ciphers] [-in filename] [-out filename] [-pass arg] [-e] [-d] [-a] [-base64] [-A] [-k password] [-kfile filename] [-K key] [-iv IV] [-S salt] [-salt] [-nosalt] [-z] [-md digest] [-iter count] [-pbkdf2] [-p] [-P] [-bufsize number] [-nopad] [-debug] [-none] [-rand file...] [-writerand file] [-engine id]
Example
openssl enc -aes-256-cbc -md sha512 -pbkdf2 -iter 1000000 -salt -in InputFilePath -out OutputFilePath
Decryption is issued simply by adding -d
switch to the end of the original command-line.