⚝
One Hat Cyber Team
⚝
Your IP:
160.79.111.20
Server IP:
15.204.235.159
Server:
Linux srv.techlup.co.ke 4.18.0-553.5.1.el8_10.x86_64 #1 SMP Wed Jun 5 09:12:13 EDT 2024 x86_64
Server Software:
Apache
PHP Version:
8.2.27
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
proc
/
self
/
root
/
usr
/
share
/
setroubleshoot
/
plugins
/
Edit File: sys_module.py
# @author Thomas Liu <tliu@redhat.com> # @author Dan Walsh <dwalsh@redhat.com> # # Copyright (C) 2009-2010 Red Hat, Inc. # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. # import gettext translation=gettext.translation('setroubleshoot-plugins', fallback=True) _=translation.gettext from setroubleshoot.util import * from setroubleshoot.Plugin import Plugin if_text = _("If you do not believe your $SOURCE_PATH should be modifying the kernel, by loading kernel modules") then_text = _("You might have been hacked.") do_text = _("Contact your security administrator and report this issue.") class plugin(Plugin): summary =_(''' Your system may be seriously compromised! $SOURCE_PATH tried to load a kernel module. ''') problem_description = _(''' SELinux has prevented $SOURCE from loading a kernel module. All confined programs that need to load kernel modules should have already had policy written for them. If a compromised application tries to modify the kernel this AVC will be generated. This is a serious issue. Your system may very well be compromised. ''') fix_description = "Contact your security administrator and report this issue." if_text = _("If you do not believe that $SOURCE_PATH should be attempting to modify the kernel by loading a kernel module.") then_text = _("A process might be attempting to hack into your system.") do_text = _("Contact your security administrator and report this issue.") fix_cmd = "" def __init__(self): Plugin.__init__(self, __name__) self.set_priority(100) self.level="red" def analyze(self, avc): if avc.has_any_access_in(['sys_module']): # MATCH return self.report() return None
Simpan