4337 links
  • Arnaud's links
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
page 1 / 1
12 results tagged audit x
  • thumbnail
    GitHub - derailed/popeye: 👀 A Kubernetes cluster resource sanitizer
    May 16, 2023 at 8:58:41 AM GMT+2 - permalink - archive.org - https://github.com/derailed/popeye
    audit k8s
  • thumbnail
    GitHub - doitintl/kube-no-trouble: Easily check your clusters for use of deprecated APIs
    October 24, 2022 at 10:48:34 AM GMT+2 * - permalink - archive.org - https://github.com/doitintl/kube-no-trouble
    audit k8s tool upgrade
  • thumbnail
    GitHub - FairwindsOps/nova: Find outdated or deprecated Helm charts running in your cluster.
    April 17, 2022 at 9:12:36 AM GMT+2 - permalink - archive.org - https://github.com/FairwindsOps/nova
    audit chart helm k8s
  • thumbnail
    Identify Unintended Resource Access with AWS Identity and Access Management (IAM) Access Analyzer | AWS News Blog
    December 3, 2019 at 9:41:36 AM GMT+1 - permalink - archive.org - https://aws.amazon.com/fr/blogs/aws/identify-unintended-resource-access-with-aws-identity-and-access-management-iam-access-analyzer/
    audit aws iam
  • thumbnail
    GitHub - aboul3la/Sublist3r: Fast subdomains enumeration tool for penetration testers
    November 26, 2019 at 1:21:27 PM GMT+1 - permalink - archive.org - https://github.com/aboul3la/Sublist3r
    audit dns
  • thumbnail
    GitHub - camptocamp/terraboard: A web dashboard to inspect Terraform States
    May 3, 2019 at 3:44:19 PM GMT+2 * - permalink - archive.org - https://github.com/camptocamp/terraboard
    audit board terraform
  • Getting Credential Reports for Your AWS Account - AWS Identity and Access Management

    To generate a report

    • :

    In addition to using credential reports, you can also determine when a password or access key was last used by using these IAM APIs:
    ListUsers (AWS CLI command: aws iam list-users)
    GetUser (AWS CLI command: aws iam get-user)
    GetAccessKeyLastUsed (AWS CLI command: aws iam get-access-key-last-used)

    September 21, 2016 at 11:16:54 AM GMT+2 - permalink - archive.org - http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html
    audit aws iam
  • GoAccess - Screenshots
    November 3, 2015 at 2:41:44 PM GMT+1 - permalink - archive.org - http://goaccess.io/screenshots
    apache audit log logs nginx web
  • enaqx/awesome-pentest · GitHub

    A collection of awesome penetration testing resources, tools and other shiny things

    January 18, 2015 at 2:25:45 PM GMT+1 - permalink - archive.org - https://github.com/enaqx/awesome-pentest
    audit security
  • linux - Is it possible to get OpenSSH to log the public key that was used in authentication? - Server Fault

    Je préfère cette solution, à savoir passer sshd en VERBOSE.

    L'autre solution consiste à utiliser environment dans le fichier authorized_keys puis à écrire dans un fichier (à l'aide de .bashrc par exemple). Mais l'utilisateur peut modifier ce fichier..

    ssh-keygen -lf /path/to/public_key_file

    December 23, 2014 at 5:15:21 PM GMT+1 - permalink - archive.org - http://serverfault.com/questions/291763/is-it-possible-to-get-openssh-to-log-the-public-key-that-was-used-in-authenticat
    audit ssh
  • thumbnail
    User Statistics — Percona Server 5.5 Documentation

    Peut servir pour auditer les comptes utilisés

    July 10, 2014 at 4:50:49 PM GMT+2 - permalink - archive.org - http://www.percona.com/doc/percona-server/5.5/diagnostics/user_stats.html?id=percona-server:features:userstatv2
    audit mysql stat user
  • How to log history and logins from multiple ssh-keys under one user account | Screenage

    Une astuce utile pour faire un audit des connexions par clé sur un compte (quand on a plusieurs personnes avec des clés différentes qui accèdent au meme user)

    Implémentation rapide :

    !/bin/bash

    #On convertit le authorized_keys pour ajouter la variable d'env

    cp ~/.ssh/authorized_keyz ~/.ssh/authorized_keyz.ORIGINAL

    IFS=$'\n'
    for line in $(cat .ssh/authorized_keys)
    do
    comment=$(echo $line|cut -d' ' -f3)
    echo "environment=\"SSH_USER=$comment\" $line" >> ~/.ssh/authorized_keyz.COMMENT
    done

    cp ~/.ssh/authorized_keyz.COMMENT ~/.ssh/authorized_keyz

    Puis dans le bashrc de l'user, ajouter ça :

    if [ "$SSHUSER" != "" ]; then
    now=$(date +%Y-%m-%d
    %H-%M-%S)
    echo $now : User $SSH_USER logged in >> ~/ssh-audit.log
    fi

    May 14, 2014 at 5:22:59 PM GMT+2 - permalink - archive.org - http://www.screenage.de/blog/2012/02/10/how-to-log-history-and-logins-from-multiple-ssh-keys-under-one-user-account-with-puppet/
    audit ssh
Links per page: 20 50 100
page 1 / 1
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Help/documentation