You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As 0-access record all ssh sessions (as long as the user use it to login), we need a new feature to be able to analyze these sessions and raise an error in case of there is a malicious code or a backdoor.
what this healthcheck does?
It should raise an error if there is a new key added to the /root/.ssh/authorized_keys or /home/*/.ssh/authorized_keys.
It should fix (rollback) these authorized_keys files.
It should monitor /etc/passwd and raise an error in case of someone add a new user there.
It should fix (rollback) this /etc/passwd.
It should raise an error if there any ssh session except 0-access ones, and a warning for any ssh session
It should raise an error if following commands are used:
rm -rf
shutdown
It should raise an error if there is a connection for a port > 1000 (it migh be mining script)
The text was updated successfully, but these errors were encountered:
Detailed description
As 0-access record all ssh sessions (as long as the user use it to login), we need a new feature to be able to analyze these sessions and raise an error in case of there is a malicious code or a backdoor.
what this healthcheck does?
rm -rf
shutdown
The text was updated successfully, but these errors were encountered: