Pluggable Authentication Modules - Linux

PAM - What and Why Authenticating a user to a service used to be a time-consuming process. The application had to be aware of all possible authentication mechanisms and had to be rebuilt every time a new authentication method was introduced… As a result, there was a significant amount of code repetition. Naturally, it was disliked by everyone!! As a result, the concept of a middle-ware application responsible for user authentication to a service arose....

December 27, 2022 · 19 min · 3879 words · ayedaemon

Recording system events with auditd

Audits are critical for system administrators to detect security violations and track security-relevant information on their systems. Anyone concerned about the security, stability, and proper operation of their Linux servers should conduct an audit. How to do auditing in linux One simple way is to use the history command to observe the shell’s history, but this has many limitations. One of them is that this command is only applicable to the current user....

December 11, 2022 · 12 min · 2419 words · ayedaemon

Hands-on Intro to SBOM

The concept of a Bill Of Materials (BOM) is well-established in traditional manufacturing as part of supply chain management. A manufacturer uses a BOM to track the parts it uses to create a product. If defects are later found in a specific part, the BOM makes it easy to locate affected products. In software industry, this concept is fairly new and is used to keep track of all the ingredients of the software....

May 27, 2022 · 8 min · 1526 words · ayedaemon

File-less malwares: what and how

What are file-less malwares? How do they work on linux? According to Wikipedia, file-less malware is a variant of computer related malicious software that exists exclusively as a computer memory-based artifact i.e. in RAM. In other words, the malware/program is never written to harddisk but directly loaded in memory. To get a better understanding of how that happens in linux, we need to understand how a normal program loads itself into memory and executes itself....

February 26, 2022 · 14 min · 2876 words · ayedaemon

Advanced Intrusion Detection Environment

Host-based intrusion detection system (HIDS) for checking the integrity of files. ...

December 19, 2020 · 5 min · 920 words · ayedaemon