lunar, Lockdown UNix Auditing and Reporting
Current version 8.0.5
Refer to lunar.sh and changelog for more up to date version information
This scripts generates a scored audit report of a Unix host’s security. It is based on the CIS and other frameworks. Where possible there are references to the CIS and other benchmarks in the code documentation.
Why a shell script? I wanted a tool that was able to run on locked down systems where other tools may not be available. I also wanted a tool that ran on all versions of UNIX. Having said that there are some differences between sh and bash, so I’ve used functions only from sh.
There is no warranty implied or given with this script. My recommendation is to use this script in audit mode only, and address each warning individually via policy, documentation and configuration management.
I am by no means a coder, so there are bound to be bugs and better ways to approach things in this script, so a sincere thank you to the people who have provided feedback, updates and patches to fix bugs/features in code.
It can also can perform a lockdown. Unlike some other scripts I have added capability to backout changes. Files are backed up using cpio to a directory based on the date.
Although it can perform a lockdown, as previously stated, I’d recommend you address the warnings via policy, documentation and configuration management. This is how I use the tool. The AWS Services audit only supports reporting, it does not provide lockdown capability.
The following Operating Systems are supported:
Windows support would require the installation of additional software, so I haven’t looked into it. Having said that, Windows support may come in the future via bash.
The following services are supported:
The AWS Services audit uses the AWS CLI, and as such requires a user with the appropriate rights. It does not currently support the lockdown capability, it only supports generating an audit report against the CIS benchmark.
There are a couple of the checks that can only be done or resolved via the GUI. An example of this is enabling billing. Refer to the CIS Benchmark for more information.
Where possible I’ve put suggested fix commands in the verbose audit output. Again in some cases, these can only be done by the CLI. Refer to the CIS Benchmark for more information.
In addition I’ve added a recommendations mode that checks AWS against publicly available best practice from companies like Cloud Conformity.
The following configuration management output is supported:
This option outputs example ansible configuration management code/stanzas for implementing the recommendation.
For UNIX:
For AWS:
Usage: ./lunar.sh [OPTIONS…]
-a Run in audit mode (for Operating Systems – no changes made to system)
-A Run in audit mode (for Operating Systems – no changes made to system)
[includes filesystem checks which take some time]
-v Verbose mode [used with -a and -A]
[Provides more information about the audit taking place]
-w Run in audit mode (for AWS – no changes made to system)
-d Run in audit mode (for Docker – no changes made to system)
-e Run in audit mode on external host (for Operating Systems – no changes made to system)
-k Run in audit mode (for Kubernetes – no changes made to system)
-x Run in recommendations mode (for AWS – no changes made to system)
-s Run in selective mode (only run tests you want to)
-l Run in lockdown mode (for Operating Systems – changes made to system)
-L Run in lockdown mode (for Operating Systems – changes made to system)
[includes filesystem checks which take some time]
-S List all UNIX functions available to selective mode
-W List all AWS functions available to selective mode
-D List all Docker functions available to selective mode
-R Print information for a specific test
-o Set docker OS or container name
-t Set docker tag
-c Run docker-compose testing suite (runs lunar in audit mode without making changes)
-C Run docker-compose testing suite (drops to shell in order to do more testing)
-p Show previous versions of file
-Z Show changes previously made to system
-b List backup files
-n Output ansible code segments
-r Specify AWS region
-z Run specified audit function
-u Undo lockdown (for Operating Systems – changes made to system)
-V Display version
-H Display usage
-h Display help
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…