All Projects → trimstray → Otseca

trimstray / Otseca

Licence: gpl-3.0
Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Otseca

Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+1554.33%)
Mutual labels:  cybersecurity, pentesting, information-gathering, security-tools
ad-privileged-audit
Provides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-89.9%)
Mutual labels:  auditing, security-audit, cybersecurity, information-gathering
Lynis
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+2096.39%)
Mutual labels:  security-tools, security-audit, auditing
Vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+2025.96%)
Mutual labels:  security-tools, cybersecurity, security-audit
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-72.12%)
Mutual labels:  security-tools, pentesting, information-gathering
Habu
Hacking Toolkit
Stars: ✭ 635 (+52.64%)
Mutual labels:  security-tools, pentesting, security-audit
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+74.28%)
Mutual labels:  security-tools, pentesting, security-audit
Pentest Notes
Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-78.61%)
Mutual labels:  security-tools, pentesting, security-audit
Gscan
本程序旨在为安全应急响应人员对Linux主机排查时提供便利,实现主机侧Checklist的自动全面化检测,根据检测结果自动数据聚合,进行黑客攻击路径溯源。
Stars: ✭ 1,177 (+182.93%)
Mutual labels:  security-tools, security-audit, auditing
Dirsearch
A Go implementation of dirsearch.
Stars: ✭ 164 (-60.58%)
Mutual labels:  security-tools, security-audit, information-gathering
Horn3t
Powerful Visual Subdomain Enumeration at the Click of a Mouse
Stars: ✭ 120 (-71.15%)
Mutual labels:  security-tools, pentesting, security-audit
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-56.25%)
Mutual labels:  security-tools, pentesting, security-audit
Social Analyzer
API, CLI & Web App for analyzing & finding a person's profile across +1000 social media \ websites (Detections are updated regularly by automated systems)
Stars: ✭ 8,449 (+1931.01%)
Mutual labels:  pentesting, information-gathering, security-tools
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+1077.16%)
Mutual labels:  cybersecurity, pentesting, security-tools
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-85.1%)
Mutual labels:  security-tools, pentesting, security-audit
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-72.12%)
Mutual labels:  security-tools, pentesting, security-audit
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+726.68%)
Mutual labels:  security-tools, information-gathering, pentesting
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-8.17%)
Mutual labels:  security-tools, pentesting, cybersecurity
Super
Secure, Unified, Powerful and Extensible Rust Android Analyzer
Stars: ✭ 340 (-18.27%)
Mutual labels:  security-tools, security-audit
Ssh Mitm
ssh mitm server for security audits supporting public key authentication, session hijacking and file manipulation
Stars: ✭ 335 (-19.47%)
Mutual labels:  security-tools, security-audit

Master

Open source security auditing tool to search and dump system configuration.


Travis-CI Version Commands License

Introduction  |   Description  |   Requirements  |   Output  |   Parameters  |   Reports  |   How it works  |   Other

Created by trimstray and contributors


Introduction

The main goal

The main assumption of creating this tool was easier and faster delivery of commands sets to be performed on customer environments. As a result of such a scan I wanted to get the most useful information about system components that will be subjected to penetration tests and audits at a later time.

For whom

Otseca facilitates collection of many important information about a given system.

It is useful for:

    ☑️ system administrators
    ☑️ security researchers
    ☑️ security professionals
    ☑️ pentesters
    ☑️ hackers

How To Use

It's simple:

# Clone this repository
git clone https://github.com/trimstray/otseca

# Go into the repository
cd otseca

# Install
./setup.sh install

# Run the app
otseca --ignore-failed --tasks system,network --output /tmp/report
  • symlink to bin/otseca is placed in /usr/local/bin
  • man page is placed in /usr/local/man/man8

Hint 1 If you do not want the script to be stopped after encountering errors add --ignore-failed script param.

Hint 2 Only selected tasks using the --tasks <task_1,task_2,task_n> script param.

Description

Otseca is a open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.

The basic goal is to get as much information about the scanned system as possible for later analysis. Otseca contains many predefined commands, however, nothing prevents you from creating your own according to your needs. In addition, it automates the entire information gathering process.

After the scan finishes, a report is generated to examine specific nooks of the system.

Requirements

This tool working with:

  • GNU/Linux (testing on Debian and CentOS)
  • Bash (testing on 4.4.19)

Also you will need root access.

Output

An exemplary result of the process of collecting information from the local system:

Master

Parameters

Below is a list of available options:

  Usage:
    otseca <option|long-option>

  Examples:
    otseca --help
    otseca --format html
    otseca --format html --ignore-failed
    otseca --format raw-html --tasks system,network

  Options:
        --help                      show this message
     -f|--format <key>              set output format (key: html/raw-html)
     -t|--tasks <key>               set specific task to do
                                    (key: system, kernel, permissions, services, network, distro, external)
     -o|--output <path>             set path to output directory report
        --show-errors               show stderr to output
        --ignore-failed             do not exit with nonzero on commands failed

Reports

Otseca generates reports in html (js, css and other) or raw-html (pure html) formats.

Default path for reports is {project}/data/output directory. If you want to change it, add the --output <path> option to call the script.

Main page (index.html)

It's the main file which contains a list of reports such as system or network.

Master

Tasks reports

The report that can be performed consists of the following sections (stacks):

  • system - dump info from system commands (output file: system.all.log.html)
  • kernel - dump info about kernel params (output file: kernel.all.log.html)
  • permissions - dump info about permissions (output file: permissions.all.log.html)
  • services - dump info about system services (output file: services.all.log.html)
  • network - dump info from network layer (output file: network.all.log.html)
  • distro - dump info about specific distribution (output file: distro.all.log.html)
  • external - all external, also user tasks or included from etc/ directory (output file: external.all.log.html)

HTML reports consist of the following blocks (example):

Master

How it works

Tasks

Otseca divides his work into tasks. Each sets of tasks performs defined commands (eg. from the file etc/otseca.conf). By default six tasks are available: system, kernel, permissions, services, network, distro and external.

By default, all tasks are performed but you can specify them with the --tasks parameter giving one or many tasks as an argument. For example:

otseca --ignore-failed --tasks system,kernel

Commands

They are actual commands executed from the configuration file grouped into tasks.

Here is an example of a network task containing several built-in commands:

NETWORK_STACK=(\

  "_exec hostname -f" \
  "_exec ifconfig -a" \
  "_exec iwconfig" \
  "_exec netstat -tunap" \
  "_exec netstat -rn" \
  "_exec iptables -nL -v" \
  "_exec iptables -nL -v -t nat" \
  "_exec iptables -S" \
  "_exec lsof -ni" \

)

Submodules

Submodules are built-in functions that perform the commands described above. Here is submodules list:

  • _exec - init standard commands, eg. _exec ls -l /etc/rsyslog.conf
  • _grep - is responsible for searching for strings in files, eg. _grep max_log_file /etc/audit/auditd.conf
  • _stat - collects information about files, eg. _stat /etc/ssh/sshd_config
  • _sysctl - compares the values of the kernel parameters, eg. _sysctl fs.suid_dumpable 1
  • _systemctl - checks the operation of services, eg. _systemctl httpd

Output states

Otseca supports three output (response) states:

  • DONE - informs that the command was executed correctly, most often it says that you did not find what you are looking for which is good information. The report is marked in green:

    • from console output:

      Master

    • from report output:

      Master

  • WARN - informs that the command was not executed correctly (syntax error, no command, file not found etc.). The report is marked in yellow:

    • from console output:

      Master

    • from report output:

      Master

  • TRUE - informs that the command was executed correctly and found what we were looking for, e.g. too wide permissions for the file /etc/sudoers. The report is marked in red:

    • from console output:

      Master

    • from report output:

      Master

Other

Contributing

See this.

Project architecture

See this.

License

GPLv3 : http://www.gnu.org/licenses/

Free software, Yeah!

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].