Powered by Blogger.
Showing posts with label Linux. Show all posts
Showing posts with label Linux. Show all posts

Cloud Security Suite: Auditing Tool For AWS Infrastructure


Cloud security suite one-stop tool for auditing the security posture of AWS infrastructure

Pre-requisites

[Python 2.7
pip
git]

Installation

[git clone https://github.com/SecurityFTW/cs-suite.git
cd cs-suite/
sudo python setup.py]
Note - Generate a set of ReadOnly AWS keys which the tool will ask to finish the installation process.

Virtual Environment installation

(So you don't mess with the already installed python libraries)
[pip install virtualenvironmentwrapper]
Add it to the respective rc file of your shell (bashrc/zshrc) (for fish shell users check virtualfish)
[echo "source /usr/local/bin/virtualenvwrapper.sh" >> ~/.bashrc]
source the file
[source ~/.bashrc]
Run env:
[cd cs-suite/
mkvirtualenv cssuite
workon cssuite
pip install -r requirements-virtual.txt
aws configure]
Once the installation is done, the tool will ask you for the AWS keys and region. These two are mandatory for the tool to work.

Run

[python cs.py]

Documentation 

Installation and running CS Suite:

Cloud Security Suite - Installation and Initiation of an AWS Audit


Cloud Security Suite - Auditing a Windows Instance

Cloud Security Suite - Auditing a Linux Instance



Researchers Have Discovered a New Privilege-Escalation Vulnerability in Linux Kernel



InfoSec researchers have found a new privilege-escalation vulnerability in Linux kernel that could allow an attacker to execute code on the affected system.

Venustech ADLab (Active-Defense Lab) researchers have discovered the Linux kernel vulnerability (CVE-2017-15265) is due to a use-after-free memory error in the Advanced Linux Sound Architecture (ALSA) sequencer interface of the affected application.

After successful exploitation of this vulnerability (CVE-2017-15265) requires an attacker with local access on the targeted machine to execute this malicious application, which allows the attacker to elevate his privilege to root the targeted machine, a CISCO advisory have warned.

More Reference: