-
Notifications
You must be signed in to change notification settings - Fork 28
Checks
The security checks are performed by "modules" in the following directory:
# ls -l lib/checks/
total 96
-rwxr-xr-x 1 root root 1738 2012-10-18 22:12 binary_banned
-rwxr-xr-x 1 root root 1867 2012-10-18 19:47 binary_change_privileges
-rwxr-xr-x 1 root root 1608 2012-10-18 19:47 binary_chroot
-rwxr-xr-x 1 root root 2725 2012-10-18 22:17 binary_dependency
-rwxr-xr-x 1 root root 1488 2012-10-18 19:47 binary_path
-rwxr-xr-x 1 root root 1458 2012-10-18 19:47 binary_pie
-rwxr-xr-x 1 root root 1482 2012-10-18 19:47 binary_random
-rwxr-xr-x 1 root root 3086 2012-10-18 19:47 binary_rpath
-rwxr-xr-x 1 root root 1402 2012-10-18 19:47 binary_ssp
-rwxr-xr-x 1 root root 1697 2012-10-18 19:47 binary_tmp
-rwxr-xr-x 1 root root 2582 2012-10-18 19:47 credentials
drwxr-xr-x 8 root root 4096 2012-10-18 19:47 enabled
-rwxr-xr-x 1 root root 1275 2012-10-18 19:47 gpg_agent
-rwxr-xr-x 1 root root 2101 2012-10-18 19:47 group_writable
-rwxr-xr-x 1 root root 1373 2012-10-18 19:47 jar
-rwxr-xr-x 1 root root 1565 2012-10-18 19:47 key_material
-rwxr-xr-x 1 root root 1697 2012-10-18 19:47 passwd_hashes
-rwxr-xr-x 1 root root 1387 2012-10-18 19:47 setgid
-rwxr-xr-x 1 root root 1387 2012-10-18 19:47 setuid
-rwxr-xr-x 1 root root 1302 2012-10-18 19:47 shadow_hashes
-rwxr-xr-x 1 root root 1562 2012-10-18 19:47 ssh_agent
-rwxr-xr-x 1 root root 1725 2012-10-18 19:47 ssh_key_unencrypted
-rwxr-xr-x 1 root root 2788 2012-10-18 19:47 system_libraries
-rwxr-xr-x 1 root root 1916 2012-10-18 19:47 world_writable
Check if privileged programs (e.g. SetUID, those run as root) call banned (and potentially dangerous) functions. Based on Microsoft's banned API list as parsed by tools/generate_banned.sh.
Check if privileged programs (e.g. SetUID, those run as root) drop their privileges.
Based on ideas found at http://people.redhat.com/sgrubb/security/
Check if privileged programs (e.g. SetUID, those run as root) calling chroot() function call also chdir() function.
Based on ideas found at http://people.redhat.com/sgrubb/security/
Check for excessive permissions over privileged files and processes' linked libraries.
Check if privileged files set PATH variable.
Based on ideas found at http://people.redhat.com/sgrubb/security/
Check for PIE (ASLR-compliant executable) support.
Based on ideas found at http://people.redhat.com/sgrubb/security/
Based on Microsoft's random API list as parsed by tools/generate_random.sh
Checks in binaries have insecure writeable/relative RPATH.
Check for stack canary (SSP) support.
Check if privileged files call temporary files handling functions.
Based on ideas found at http://people.redhat.com/sgrubb/security/
Check for read permissions on sensitive files.
Check if the gpg-agent is running
List group-writable files
List all jar files
List potentially sensitive files
List users with no password set or password in /etc/passwd
List setgid files.
List setuid files.
List users with no password set.
Check if the ssh-agent is running and list SSH unencrypted keys.
List unencrypted SSH client private keys.
List group-writable and world-writable system libraries and their parent directories.
List world-writable files