#!/usr/bin/env python3
# -*- coding:utf8 -*-
# Author:
# Description: 安全基线检测
import os
import re
import json
import argparse
import datetime
import subprocess
class SafeBaseline:
@staticmethod
def parameters():
"""
传递参数
:return:
"""
parser = argparse.ArgumentParser()
parser.add_argument("--resultFields", "-resultFields", help="检查项")
parser.add_argument("--userWhiteList", "-userWhiteList", help="用户白名单")
parser.add_argument("--portWhiteList", "-portWhiteList", help="端口白名单")
parser.add_argument("--commandWhiteList", "-commandWhiteList", help="命令白名单")
parser.add_argument("--systemWhiteList", "-systemWhiteList", help="系统白名单")
params = parser.parse_args()
return params
@staticmethod
def open_file(filename):
"""
读取文件内容
:param filename: 文件名
:return:
"""
with open(filename) as f:
data = f.read()
return data
@classmethod
def system_command(cls, command):
"""
执行系统命令
:param command: 命令
:return: 输出结果,报错,执行状态
:param command:
:return:
"""
shell = subprocess.Popen(command, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
stdout, stderr = shell.communicate()
try:
return stdout.decode("utf8"), stderr.decode("utf8"), shell.returncode
except Exception:
return stdout.decode("gbk"), stderr.decode("gbk"), shell.returncode
def systemAccountCheck(self):
"""
1.系统账户安全检查
:return:
"""
stdout, stderr, return_code = self.system_command("cat /etc/login.defs |egrep '^PASS_MIN_LEN'")
password_length = stdout.replace('PASS_MIN_LEN','').strip()
warn_level = []
details = []
password_complexity = re.search('pam_cracklib.so.*?\n',self.open_file('/etc/pam.d/system-auth-ac'))
if password_complexity:
if re.search(r"dcredit=(-?\d+)", password_complexity.group()):
dcredit = re.search(r"dcredit=(-?\d+)", password_complexity.group()).group(1)
if int(dcredit.replace('-', '')) >= 2:
warn_level.append(1)
else:
details.append('系统账户密码策略要求最少一个数字,当前个数为{}'.format(dcredit.replace('-', '')))
else:
details.append('系统账户密码策略要求最少一个数字')
if re.search(r"lcredit=(-?\d+)", password_complexity.group()):
lcredit = re.search(r"lcredit=(-?\d+)", password_complexity.group()).group(1)
if int(lcredit.replace('-', '')) >= 1:
warn_level.append(1)
else:
details.append('系统账户密码策略要求最少一个小写字母,当前个数为{}'.format(lcredit.replace('-', '')))
else:
details.append('系统账户密码策略要求最少一个小写字母')
if re.search(r"ucredit=(-?\d+)", password_complexity.group()):
ucredit = re.search(r"ucredit=(-?\d+)", password_complexity.group()).group(1)
if int(ucredit.replace('-', '')) >= 1:
warn_level.append(1)
else:
details.append('系统账户密码策略要求最少一个大写字母,当前个数为{}'.format(ucredit.replace('-', '')))
else:
details.append('系统账户密码策略要求最少一个大写字母,当前未配置')
if re.search(r"ocredit=(-?\d+)", password_complexity.group()):
ocredit = re.search(r"ocredit=(-?\d+)", password_complexity.group()).group(1)
if int(ocredit.replace('-', '')) >= 1:
warn_level.append(1)
else:
details.append('系统账户密码策略要求最少一个特殊字符,当前个数为{}'.format(ocredit.replace('-', '')))
else:
details.append('系统账户密码策略要求最少一个特殊字符,当前未配置')
if re.search(r"minlen=(-?\d+)", password_complexity.group()):
minlen = re.search(r"minlen=(-?\d+)", password_complexity.group()).group(1)
if int(minlen.replace('-', '')) >= 8:
warn_level.append(1)
else:
details.append('系统账户密码策略要求密码口令最少8位,当前个数为 {}'.format(minlen.replace('-', '')))
else:
details.append('系统账户密码策略要求密码口令最少8位,当前未配置')
else:
if int(password_length) >= 8:
warn_level.append(1)
details.append({'Conformity': '系统账户密码策略要求密码口令8位','NonConformity': '系统账户密码复杂度其他项未配置'})
else:
details.append('系统账户密码复杂度未设置')
if len(warn_level) >= 5:
result = 0
elif 4 <= len(warn_level) < 5:
result = 1
else:
result = 2
return {"result": result, "Details": details}
def remoteLoginCheck(self):
"""
远程登陆检查
:return:
"""
result = 0
details = []
today = datetime.date.today()
start_month = today.strftime("%b")
last_month = today.replace(day=1) - datetime.timedelta(days=1)
end_month = last_month.strftime("%b")
command = "cat /var/log/secure* |grep -E '^%s|^%s'|egrep 'Accept.*[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}.*port.*'|awk '{print $1,$2,$3,$9,$11}'" % (end_month, start_month)
stdout, stderr, return_code = self.system_command(command)
if stdout:
result = 3
for info in stdout.strip().split('\n'):
info_list = info.split(' ')
if {'USER': info_list[3], 'IPADDRESS': info_list[4]} not in details:
details.append({'USER': info_list[3], 'IPADDRESS': info_list[4]} )
return {"result": result, "Details": details}
def opensslVersionCheck(self):
"""
检查openssl版本是否高于1.1.1
:return:
"""
details = []
result = 0
stdout, stderr, return_code = self.system_command('openssl version')
if re.search('\d+\.\d+\.\d+',stdout).group():
data = ''.join(re.search('\d+\.\d+\.\d+',stdout).group().split('.'))
if int(data) > 111:
result = 0
else:
result = 2
details.append('当前Openssl版本为{}, 安全基线版本要求为1.1.1 '.format('.'.join(data)))
return {"result": result, "Details": details}
def opensshVersionCheck(self):
"""
检查openssh版本是否高于8.6p1
:return:
"""
details = []
result = 0
stdout, stderr, return_code = self.system_command('ssh -V')
if re.findall('OpenSSH_(.*?),', "{}{}".format(stdout, stderr)):
data = re.search('OpenSSH_(.*?),', "{}{}".format(stdout, stderr)).group()
version = ''.join(re.findall('\d+', data))
if int(version) <= 861:
result = 2
details.append('当前Openssh版本为{},安全基线版本要求为8.6p1'.format(data.replace(',', '')))
return {"result": result, "Details": details}
def nonSystemDefaultUsersCheck(self):
"""
检查非系统默认用户
:return:
"""
stdout, stderr, return_code = self.system_command("cat /etc/passwd |awk -F ':' '{print $1}'|grep -Ev 'root|sshd|bin|daemon|adm|lp|sync|shutdown|halt|mail|operator|ftp|nobody|systemd-network|dbus|polkitd|libstoragemgmt|rpc|saned|gluster|saslauth|abrt|chrony|unbound|qemu|sssd|usbmuxd|ntp|gdm|rpcuser|nfsnobody|postfix|tcpdump'")
if self.parameters().systemWhiteList:
non_system_user = [user for user in stdout.split('\n') if user not in self.parameters().systemWhiteList.split(',') and user != '' ]
else:
non_system_user = [user for user in stdout.split('\n') if user != '' ]
result = 1 if non_system_user else 0
details = non_system_user
return {"result": result, "Details": details}
def userAuthorityCheck(self):
"""
列出高权限的用户和用户组确保UID为0的用户只有root,
UID为0的用户为高权限用户,判断是否存在其他高权限用户及用户组
:return:
"""
details = []
result = 0
stdout, stderr, return_code = self.system_command("cat /etc/sudoers|grep -E -v '^#'|grep 'ALL=(ALL)'")
default_user_group = ['root', '%wheel']
if self.parameters().userWhiteList:
default_user_group.extend(self.parameters().userWhiteList.split(','))
for user in stdout.strip().split('\n'):
if user.split('ALL=(ALL)')[0].replace('\t','') not in default_user_group:
if user.split('ALL=(ALL)')[0].startswith('%'):
result = 2
details.append({'高权限用户组': '{}'.format(user.split('ALL=(ALL)')[0]).replace('\t','')})
else:
result = 2
details.append({'高权限用户': '{}'.format(user.split('ALL=(ALL)')[0]).replace('\t','')})
return {"result": result, "Details": details}
def historyCommandCheck(self):
"""
5.history文件和命令检查
:return:
"""
result = 0
details = []
bash_history_file = os.path.join(os.path.expanduser('~'), '.bash_history')
stdout, stderr, return_code = self.system_command("cat {}".format(bash_history_file))
serious_level_command = [
'> /dev/sda', 'mv $file /dev/null', '.(){ .|.& };.', 'rm -rf /'
'^foo^bar', 'dd if=/dev/random of=/dev/sda',
]
warning_level_command = [
'file->', 'wget url -O- | sh', 'wget', 'curl', 'rm -rf *', 'rm -rf .'
]
if self.parameters().commandWhiteList:
command_list = [command for command in self.parameters().commandWhiteList.split(',') if command != '']
for command in command_list:
if command in serious_level_command:
serious_level_command.remove(command)
if command in warning_level_command:
warning_level_command.remove(command)
for command in stdout.split('\n'):
for serious_command in serious_level_command:
if command.startswith(serious_command):
result = 2
if command not in details:
details.append(command)
for warning_command in warning_level_command:
if command.startswith(warning_command):
print(command)
if result != 2:
result = 1
if command not in details:
details.append(command)
return {"result": result, "Details": details}
def systemCommandModifyCheck(self):
"""
系统命令修改检查
:return:
"""
shell_script = """
#!/bin/bash --login
shopt expand_aliases
shopt -s expand_aliases
shopt expand_aliases
alias
"""
result = 0
details = []
with open('alias_script_for_check.sh','w') as f:
f.write(shell_script.strip())
stdout, stderr, return_code = self.system_command('chmod +x alias_script_for_check.sh && ./alias_script_for_check.sh |grep -v expand && rm -rf alias_script_for_check.sh')
system_default_command = [
"alias cp='cp -i'", "alias egrep='egrep --color=auto'", "alias fgrep='fgrep --color=auto'",
"alias grep='grep --color=auto'", "alias l.='ls -d .* --color=auto'", "alias ll='ls -l --color=auto'",
"alias ls='ls --color=auto'", "alias mv='mv -i'", "alias rm='rm -i'",
"alias which='alias | /usr/bin/which --tty-only --read-alias --show-dot --show-tilde'"
]
for alias in stdout.strip().split('\n'):
if alias not in system_default_command:
result = 1
details.append('{}'.format(alias))
return {"result": result, "Details": details}
def sshForceAttackCheck(self):
"""
SSH爆力破解检查
:return:
"""
command = """
find /var/log -name 'secure*' -type f | while read line;do awk '/Failed/{print $(NF-3)}' $line;done | awk '{a[$0]++}END{for (j in a) if(a[j] > 20) print j"="a[j]}' | sort -n -t'=' -k 2
"""
stdout, stderr, return_code = self.system_command(command)
details = []
if stdout:
result = 2
details.append(stdout)
else:
result = 0
return {"result": result, "Details": details}
def inetdBackDoorCheck(self):
"""
ssh文件后门检查
:return:
"""
command = """
[[ -f "~/.ssh/config" ]] && egrep -i 'ProxyCommand|LocalCommand' ~/.ssh/config
"""
stdout, stderr, return_code = self.system_command(command)
details = []
if stdout:
result = 2
details.append(stdout)
else:
result = 0
return {"result": result, "Details": details}
def maliciousFileCheck(self):
"""
恶意文件检查
:return:
"""
malicious_file_list = [
'ISY.EXE', '2SY.EXE', 'EXERT.exe', 'ld.so.preload', 'libioset.so', 'watchdogs',
'ksoftirqds', 'EXPIORER.com', 'finders.com', 'Logol_exe', 'LSASS.exe', 'mstask.exe',
'popwin.exe', 'smss.exe', 'SQL Slammer', 'MS Blaster'
]
details = []
result = 0
for file in malicious_file_list:
stdout, stderr, return_code = self.system_command('find /* -type f -name "{}"'.format(file))
if stdout:
details.append('{}'.format(file))
result = 2
return {"result": result, "Details": details}
def inetdConfBackDoorFileCheck(self):
"""
/etc/inetd.conf文件后门检查
:return:
"""
command = """
[[ -f "/etc/inetd.conf" ]] && grep -E '(bash -i)' /etc/inetd.conf
"""
stdout, stderr, return_code = self.system_command(command)
details = []
if stdout:
result = 2
details.append(stdout)
else:
result = 0
return {"result": result, "Details": details}
def crontabCheck(self):
"""
crontab计划检查
:return:
"""
malicious_script_execution_plan = ['wget', 'cron.hourly']
result = 0
details = []
for plan in malicious_script_execution_plan:
stdout, stderr, return_code = self.system_command('crontab -l|grep {}'.format(plan))
if stdout:
result = 2
details.append('{}'.format(stdout).replace('\n',''))
return {"result": result, "Details": details}
def maliciousProcessCheck(self):
"""
12.恶意进程检查
:return:
"""
result = 0
details = []
system_service_default_process_white_list = [
'uwsgi', 'python', 'kthreadd', 'kworker', 'ksoftirqd/0', 'migration/0', 'rcu_bh', 'rcu_sched', 'lru-add-drain',
'watchdog/0', 'watchdog/1', 'migration/1', 'ksoftirqd/1]', 'kworker/1:0H', 'watchdog/2', 'ksoftirqd/2',
'netns', 'kdevtmpfs]', 'kworker/3:0H]', 'writeback', 'watchdogd', 'ksmd', 'crypto', 'xfs-buf/dm-0',
'xfs-data/dm-0', 'xfs-reclaim/dm-', 'xfs-log/dm-0', 'kworker/2:3', 'systemd-journald', 'systemd-udevd',
'auditd', 'audispd', 'sedispatch', 'vmtoolsd', 'bluetoothd', 'ModemManager', 'rtkit-daemon', 'chronyd',
'accounts-daemon', 'systemd-logind', 'udisksd', 'ksmtuned', 'libvirtd', 'libvirt_leaseshelper', 'upowerd'
'/usr/sbin/gdm', '/usr/libexec/boltd', '/usr/libexec/packagekitd', 'wpa_supplicant.pid', '/usr/libexec/colord',
'imsettings-daemon', '/usr/libexec/gvfsd', 'at-spi-bus-launcher', 'gnome-shell', 'ibus-dconf', 'ibus-portal',
'gnome-shell-calendar-server', 'xdg-permission-store', 'evolution-source-registry', 'dconf-service',
'mission-control-5', 'gvfs-udisks2-volume-monitor', 'goa-daemon', 'gvfs-afc-volume-monitor', 'gvfs-gphoto2-volume-monitor',
'goa-identity-service', 'gvfs-mtp-volume-monitor', 'gvfs-goa-volume-monitor', 'gsd-power','gsd-print-notifications',
'gsd-rfkill', 'gsd-screensaver-proxy', 'gsd-sharing', 'gsd-sound', 'gsd-xsettings', 'gsd-wacom', 'gsd-smartcard',
'gsd-account', 'gsd-a11y-settings', 'gsd-clipboard', 'gsd-color', 'gsd-datetime', 'gsd-housekeeping', 'gsd-keyboard',
'evolution-calendar-factory', 'gsd-media-keys', 'gsd-mouse', 'gsd-printer', 'evolution-addressbook-factory',
'gsd-disk-utility-notify', 'tracker-extract', 'tracker-miner-apps', 'tracker-miner-fs', 'tracker-miner-user-guides',
'tracker-store', 'ibus-engine-simple', 'gvfsd-metadata', 'fwupd','gconfd-2', '-bash', 'dhclient', 'abrt-applet',
'awk','systemd', 'sshd', 'ps', 'bash', 'gdm-session-worker', 'gnome', 'sleep', 'NetworkManager', 'rngd', 'rpcbind',
'crond', 'rsyslogd', 'lsmd', 'atd', 'smartd', 'lvmetad', 'dbus-daemon', 'ssh-agent', 'dnsmasq', 'upowerd', 'ibus-daemon',
'avahi-daemon', 'alsactl', 'clickhouse', 'postgres', 'httpd', 'dbus-launch', 'NetworkManager', 'java',
]
command = "ps -f --ppid 2 -p 2 -N | grep -v grep|grep -v PID|awk -F ' ' '{print $1,$2,$8}'|grep -Ev '%s'" % '|'.join(system_service_default_process_white_list)
# print(command)
stdout, stderr, return_code = self.system_command(command)
if stdout:
result = 1
for info in stdout.strip().split('\n'):
try:
data = info.split(' ')
if {'USER': data[0], 'PID': data[1], 'CMD': data[2]} not in details:
details.append({'USER': data[0], 'PID': data[1], 'CMD': data[2]})
except Exception as e:
exception = e
return {"result": result, "Details": details}
def portListenCheck(self):
"""
监听端口检查
:return:
"""
result = 0
details = []
safe_level_port_list = []
product_port = [
'18080-18089', '18093-18096', 18091, '18100-18144', '18160-18165', 123, '18201-18209', '18211-28212',
'18216-18217', 18220, 18226, '18241-18242', '18246-18248', '18250-18252', 18256, '18260-18261', 18256,
'18260-18261', 18266, 18274, 18281, '18286-18287', '18292-18305', '18311-18312', 18316, '18321-18333',
18336, '18501-18508', '18355-18358', '18341-18344', '18346-18348', '18371-18375', '18377-18380', '18383-18391',
18406, 18408, '18421-18426', '18431-18434', '18436-18486', '18488-18493', '19001-19005', '19011-19030',
'20-23', 25, 53, 69, '80-89', 443, '8440-8450', '8080-8089', '110-111', 2049, 137, 139, 445, 143, 161, 389,
'512-514', 873, 1194, 1352, 1433, 1521, 1500, 1723, '2082-2083', 2181, 2601, 2604, 3128, '3311-3312', 3306,
3389, 3690, 4848, 5000, 5432, '5900-5902', 5984, 6379, '7001-7002', 7778, 8000, 8443, 8069, '9080-9081', 9090,
9200, 9300, 11211, 27017,27018, 50000, 50070, 50030, 58, 894
]
if self.parameters().portWhiteList:
port_white_list = [int(i) for i in self.parameters().portWhiteList.split(',') if i != '']
product_port.extend(port_white_list)
for port in product_port:
if isinstance(port,str):
s_number = int(port.split('-')[0])
e_number = int(port.split('-')[1])
for i in range(s_number, e_number+1):
safe_level_port_list.append(i)
else:
safe_level_port_list.append(port)
# command = "netstat -anlp|awk -F ' ' '{print $4,$7}'| grep -v '\['|grep -v 'ACC' |grep -v ']'|awk -F ':' '{print $NF}'|grep -P '\d'|grep '/'"
command = " ss -tunlp|grep -v Local|awk '{print $5,$7}'"
stdout, stderr, return_code = self.system_command(command)
for port in stdout.strip().split('\n'):
result = 1
PORT = int(port.split(' ')[0].split(':')[-1])
# ProgramName = re.search('"(.*?)"',port.split(' ')[1]).group().replace('"','')
PID = re.search('pid=\d+',port.split(' ')[1]).group().replace('pid=','')
cmd = """ awk '{$1=$2=$3=$4=$5=$6=$7=""; print $0}' """
stdout, stderr, return_code = self.system_command("ps -ef |grep {}|grep -v 'ps -ef'|grep -v grep|{}".format(PID,cmd))
ProgramName = stdout.strip().split('\n')[0]
if PORT not in safe_level_port_list:
if {'PORT':PORT, 'ProgramName':ProgramName, 'PID': PID} not in details:
details.append({'PORT':PORT, 'ProgramName':ProgramName, 'PID': PID})
return {"result": result, "Details": details}
def miningFileProgressCheck(self):
"""
挖矿文件进程检查
:return:
"""
result = 0
details = []
mining_file = ['ZavD6x','wbew', 'httpdz','lru-add-drain', 'wwatchdog']
for file in mining_file:
command = " ps -aux |grep -E '{}'|grep -v grep".format(file)
stdout, stderr, return_code = self.system_command(command)
if stdout:
result = 2
details.append('{}'.format(file))
return {"result": result, "Details": details}
def run(self):
"""
调用逻辑
:return:
"""
system_level = ["systemAccountCheck", "remoteLoginCheck", "opensslVersionCheck", "opensshVersionCheck"]
users_level = [
"nonSystemDefaultUsersCheck", "userAuthorityCheck", "historyCommandCheck",
"systemCommandModifyCheck", "sshForceAttackCheck", "inetdBackDoorCheck"
]
file_level = ["maliciousFileCheck", "inetdConfBackDoorFileCheck", "crontabCheck"]
process_level = ["maliciousProcessCheck", "portListenCheck"]
event_level = ["miningFileProgressCheck"]
data = {}
result_fields_data = []
if self.parameters().resultFields:
result_fields_data = self.parameters().resultFields.split(',')
else:
result_fields_data.extend(system_level)
result_fields_data.extend(users_level)
result_fields_data.extend(file_level)
result_fields_data.extend(process_level)
result_fields_data.extend(event_level)
for field in result_fields_data:
field_value = eval("self.%s()" % field)
if field in system_level:
if not data.get("systemLevel"):
data["systemLevel"] = {}
data["systemLevel"].update({field: field_value})
elif field in users_level:
if not data.get("usersLevel"):
data["usersLevel"] = {}
data["usersLevel"].update({field: field_value})
elif field in file_level:
if not data.get("fileLevel"):
data["fileLevel"] = {}
data["fileLevel"].update({field: field_value})
elif field in process_level:
if not data.get("processLevel"):
data["processLevel"] = {}
data["processLevel"].update({field: field_value})
elif field in event_level:
if not data.get("eventLevel"):
data["eventLevel"] = {}
data["eventLevel"].update({field: field_value})
result_list = []
if data:
for level in list(data.keys()):
for check in data.get(level):
result = data.get(level).get(check).get('result')
result_list.append(result)
if 2 in result_list:
riskLevel = 2
elif 1 in result_list:
riskLevel = 1
else:
riskLevel = 0
check_result = {
"riskLevel": riskLevel,
"data": data
}
print(json.dumps(check_result,ensure_ascii=False))
return json.dumps(check_result,ensure_ascii=False)
class Html:
def __init__(self):
self.safe_baseline = SafeBaseline()
self.json_params = json.loads(self.safe_baseline.run())
self.level = [{'key': 2, 'value': '<font color="red">严重</font>'},
{'key': 1, 'value': '<font color="orange">警告</font>'},
{'key': 0, 'value': '<font color="info">安全</font>'},
{'key': 3, 'value': '<font color="blue">人工审核</font>'}]
@staticmethod
def create_file(filename, html):
with open(filename, 'w') as f:
f.write(html)
@staticmethod
def replace(file_name, before, after):
with open(file_name, 'r+') as f:
t = f.read()
t = t.replace(before, after)
f.seek(0, 0)
f.write(t)
f.truncate()
@staticmethod
def html_body():
message = """
<!DOCTYPE HTML >
<html>
<head>
<meta charset="utf-8">
<title>安全评估检测报告</title>
<link rel="stylesheet" href="bootstrap/css/bootstrap.min.css">
<link rel="stylesheet" href="bootstrap/css/bootstrap.css">
</head>
<body>
<div class="container-fluid">
<div class="page-header">
<center><h1>主机安全评估检测报告</h1></center>
</div>
<div>
<center><h2> 安全检测级别说明</h2></center>
<table class="table table-bordered table-striped">
<tr>
<th>安全检测级别</th>
<th>检测级别说明</th>
</tr>
<tr>
<th width="200">严重级</th>
<td width="200">需进行整改</td>
</tr>
<tr>
<th>警告级</th>
<td>需根据实际情况选择整改</td>
</tr>
<tr>
<th>人工审计</th>
<td>需要人工判断有无风险</td>
</tr>
<tr>
<th>安全级</th>
<td>安全级表示主机无风险</td>
</tr>
</table>
</div>
{{safeCheckOverview}}
{{systemLevel}}
{{systemAccountCheck}}
{{remoteLoginCheck}}
{{opensslVersionCheck}}
{{opensshVersionCheck}}
{{usersLevel}}
{{nonSystemDefaultUsersCheck}}
{{userAuthorityCheck}}
{{systemCommandModifyCheck}}
{{sshForceAttackCheck}}
{{inetdBackDoorCheck}}
{{historyCommandCheck}}
{{fileLevel}}
{{crontabCheck}}
{{maliciousFileCheck}}
{{inetdConfBackDoorFileCheck}}
{{processLevel}}
{{maliciousProcessCheck}}
{{portListenCheck}}
{{eventLevel}}
{{miningFileProgressCheck}}
</div>
</body>
</html>
"""
return message
def safeCheckOverview(self):
# 安全合规检测概览
check_time = datetime.datetime.now().strftime('%Y-%m-%d %H:%M:%S')
ip_address = " ifconfig|grep inet|grep -E -o '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}'|grep -v -E '1$|0$|^255|255$|127.0.0.1'"
ip_address_stdout, stderr, return_code = self.safe_baseline.system_command(ip_address)
risk_level = self.json_params.get('riskLevel')
overall_risk_level = ''
# 检查整体风险等级
for level in self.level:
if level.get('key') == risk_level:
overall_risk_level = level.get('value')
# 整体风险等级个数统计
result_list = []
if self.json_params.get('data'):
for level in list(self.json_params.get('data').keys()):
# print(level)
for check in self.json_params.get('data').get(level):
result = self.json_params.get('data').get(level).get(check).get('result')
result_list.append(result)
# 单个风险等级个数统计
warning_level_number = len([i for i in result_list if i == 1])
serious_level_number = len([i for i in result_list if i == 2])
safe_level_number = len([i for i in result_list if i == 0])
manual_audit_level_number = len([i for i in result_list if i == 3])
message = f"""
<center><h2> 安全合规检测概览 </h2></center>
<table class="table table-bordered table-striped">
<tr>
<th>整体风险等级</th>
<td> <b>{overall_risk_level}</b></td>
<th> 严重级别</th>
<td><font color="red"> {serious_level_number} </font> 个</td>
</tr>
<tr>
<th>任务名称</th>
<td>主机安全合规检测</td>
<th>警告级别</th>
<td><font color="orange"> {warning_level_number} </font> 个</td>
</tr>
<tr>
<th>扫描对象</th>
<td>{ip_address_stdout}</td>
<th> 人工审核级别</th>
<td><font color="blue"> {manual_audit_level_number} </font>个</td>
</tr>
<tr>
<th width="200">扫描时间</th>
<td width="200">{check_time}</td>
<th width="200">安全级别</th>
<td width="200"><font color="info"> {safe_level_number} </font> 个</td>
</tr>
</table>
<center> <h2>安全合规检测内容</h2></center>
<hr>
"""
return message
def systemAccountCheck(self):
data = self.json_params.get('data').get('systemLevel').get('systemAccountCheck')
safe_check_level = ''
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
details = ['<li><font color="black">{}</font></li>'.format(i) for i in data.get('Details')]
html_tag = ' '.join(details)
message = f"""
<h4>系统账户安全检查</h4>
<table class="table table-striped table-bordered">
<tr>
<th width="200">风险等级</th>
<th width="200">{safe_check_level}</th>
</tr>
<tr>
<td>详情</td>
<td>
<ul>
{html_tag}
</ul>
</tr>
</table>
"""
return message
def remoteLoginCheck(self):
data = self.json_params.get('data').get('systemLevel').get('remoteLoginCheck')
safe_check_level = ''
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
html_tag = data.get('Details')
tmp = []
for detail in html_tag:
tmp.append(
'<tr> <td width="150">用户名</td> <td width="150">{}</td> <td width="150">IP地址</td> <td width="150"> {} </td> </tr>'.format(
detail.get('USER'), detail.get('IPADDRESS')))
message = f"""
<h4> 远程登录检查</h4>
<table class="table table-striped table-bordered">
<tr>
<th colspan="2" width="200">风险等级</th>
<th colspan="2" width="200">{safe_check_level}</th>
</tr>
{''.join(tmp)}
</table>
"""
return message
def opensslVersionCheck(self):
data = self.json_params.get('data').get('systemLevel').get('opensslVersionCheck')
safe_check_level = ''
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
#
html_tag = ['<tr> <td>详情</td> <td> <font color="black">{}</font></td> </tr>'.format(i) for i in
data.get('Details')]
message = f"""
<h4>openssl版本检查</h4>
<table class="table table-striped table-bordered">
<tr>
<th width="200">风险等级</th>
<th width="200">{safe_check_level}</th>
</tr>
{''.join(html_tag)}
</table>
"""
return message
def opensshVersionCheck(self):
data = self.json_params.get('data').get('systemLevel').get('opensshVersionCheck')
safe_check_level = ''
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
#
html_tag = ['<tr> <td>详情</td> <td> <font color="black">{}</font></td> </tr>'.format(i) for i in
data.get('Details')]
message = f"""
<h4>openssh版本检查</h4>
<table class="table table-striped table-bordered">
<tr>
<th width="200">风险等级</th>
<th width="200">{safe_check_level}</th>
</tr>
{''.join(html_tag)}
</table>
"""
return message
def nonSystemDefaultUsersCheck(self):
data = self.json_params.get('data').get('usersLevel').get('nonSystemDefaultUsersCheck')
safe_check_level = ''
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
details = ['<li><font color="black">{}</font></li>'.format(i) for i in data.get('Details')]
html_tag = ' '.join(details)
message = f"""
<h4>非系统默认用户检测</h4>
<table class="table table-striped table-bordered">
<tr>
<th width="200">风险等级</th>
<th width="200">{safe_check_level}</th>
</tr>
<tr>
<td>人工审核用户列表</td>
<td>
<ul>
{html_tag}
</ul>
</td>
</tr>
</table>
"""
return message
def userAuthorityCheck(self):
data = self.json_params.get('data').get('usersLevel').get('userAuthorityCheck')
safe_check_level = ''
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
details = ['<li><font color="black">{}</font></li>'.format(i) for i in data.get('Details')]
html_tag = ' '.join(details)
message = f"""
<h4>高权限的用户和用户组检测</h4>
<table class="table table-striped table-bordered">
<tr>
<th width="200">风险等级</th>
<th width="200">{safe_check_level}</th>
</tr>
<tr>
<td>人工审核高权限的用户和用户组</td>
<td>
<ul>
{html_tag}
</ul>
</td>
</tr>
</table>
"""
return message
def systemCommandModifyCheck(self):
data = self.json_params.get('data').get('usersLevel').get('systemCommandModifyCheck')
safe_check_level = ''
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
details = ['<li><font color="black">{}</font></li>'.format(i) for i in data.get('Details')]
html_tag = ' '.join(details)
message = f"""
<h4>系统命令被修改的内容和被修改时间检查</h4>
<table class="table table-striped table-bordered">
<tr>
<th width="200">风险等级</th>
<th width="200">{safe_check_level}</th>
</tr>
<tr>
<td>人工审核命令修改记录</td>
<td>
<ul>
{html_tag}
</ul>
</td>
</tr>
</table>
"""
return message
def sshForceAttackCheck(self):
data = self.json_params.get('data').get('usersLevel').get('sshForceAttackCheck')
safe_check_level = ''
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
details = ['<li><font color="black">{}</font></li>'.format(i) for i in data.get('Details')]
html_tag = ' '.join(details)
message = f"""
<h4>SSH爆力破解检查</h4>
<table class="table table-striped table-bordered">
<tr>
<th width="200">风险等级</th>
<th width="200">{safe_check_level}</th>
</tr>
<tr>
<td>详情</td>
<td>
<ul>
{html_tag}
</ul>
</td>
</tr>
</table>
"""
return message
def inetdBackDoorCheck(self):
data = self.json_params.get('data').get('usersLevel').get('inetdBackDoorCheck')
safe_check_level = ''
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
details = ['<li><font color="black">{}</font></li>'.format(i) for i in data.get('Details')]
html_tag = ' '.join(details)
message = f"""
<h4>SSH 后门配置/inetd后门检查</h4>
<table class="table table-striped table-bordered">
<tr>
<th width="200">风险等级</th>
<th width="200">{safe_check_level}</th>
</tr>
<tr>
<td>详情</td>
<td>
<ul>
{html_tag}
</ul>
</td>
</tr>
</table>
"""
return message
def historyCommandCheck(self):
data = self.json_params.get('data').get('usersLevel').get('historyCommandCheck')
safe_check_level = ''
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
details = ['<li><font color="black">{}</font></li>'.format(i) for i in data.get('Details')]
html_tag = ' '.join(details)
message = f"""
<h4>history文件和命令检查</h4>
<table class="table table-striped table-bordered">
<tr>
<th width="200">风险等级</th>
<th width="200">{safe_check_level}</th>
</tr>
<tr>
<td>人工审核历史命令</td>
<td>
<ul>
{html_tag}
</ul>
</td>
</tr>
</table>
"""
return message
def maliciousFileCheck(self):
data = self.json_params.get('data').get('fileLevel').get('maliciousFileCheck')
safe_check_level = ''
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
details = ['<li><font color="black">{}</font></li>'.format(i) for i in data.get('Details')]
html_tag = ' '.join(details)
message = f"""
<h4>恶意文件检查</h4>
<table class="table table-striped table-bordered">
<tr>
<th width="200">风险等级</th>
<th width="200">{safe_check_level}</th>
</tr>
<tr>
<td> 详情</td>
<td>
<ul>
{html_tag}
</ul>
</td>
</tr>
</table>
"""
return message
def inetdConfBackDoorFileCheck(self):
data = self.json_params.get('data').get('fileLevel').get('inetdConfBackDoorFileCheck')
safe_check_level = ''
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
details = ['<li><font color="black">{}</font></li>'.format(i) for i in data.get('Details')]
html_tag = ' '.join(details)
message = f"""
<h4>/etc/inetd.conf文件后门检查</h4>
<table class="table table-striped table-bordered">
<tr>
<th width="200">风险等级</th>
<th width="200">{safe_check_level}</th>
</tr>
<tr>
<td> 详情</td>
<td>
<ul>
{html_tag}
</ul>
</td>
</tr>
</table>
"""
return message
def crontabCheck(self):
data = self.json_params.get('data').get('fileLevel').get('crontabCheck')
safe_check_level = ''
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
details = ['<li><font color="black">{}</font></li>'.format(i) for i in data.get('Details')]
html_tag = ' '.join(details)
message = f"""
<h4>crontab计划检查</h4>
<table class="table table-striped table-bordered">
<tr>
<th width="200">风险等级</th>
<th width="200">{safe_check_level}</th>
</tr>
<tr>
<td> 详情</td>
<td>
<ul>
{html_tag}
</ul>
</td>
</tr>
</table>
"""
return message
def maliciousProcessCheck(self):
data = self.json_params.get('data').get('processLevel').get('maliciousProcessCheck')
safe_check_level = ''
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
html_tag = []
for i in data.get('Details'):
html_tag.append(
'<tr><td width="150">进程命令</td> <td width="150"> {} </td> <td width="150">用户名</td> <td width="150">{}</td> <td width="150">进程ID</td> <td width="150">{}</td> </tr>'.format(
i.get('CMD'), i.get('USER'), i.get('PID')))
html_tag = ' '.join(html_tag)
message = f"""
<h4> 恶意进程检查</h4>
<table class="table table-striped table-bordered">
<tr>
<th colspan="3" width="200">风险等级</th>
<th colspan="3" width="200">{safe_check_level}</th>
</tr>
{html_tag}
</table>
"""
return message
def portListenCheck(self):
data = self.json_params.get('data').get('processLevel').get('portListenCheck')
safe_check_level = ''
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
html_tag = []
for i in data.get('Details'):
html_tag.append(
'<tr><td width="150">程序名称</td> <td width="150"> {} </td> <td width="150">端口</td> <td width="150">{}</td> <td width="150">进程ID</td> <td width="150">{}</td> </tr>'.format(
i.get('ProgramName'), i.get('PORT'), i.get('PID')))
html_tag = ' '.join(html_tag)
message = f"""
<h4>端口监听检测 </h4>
<table class="table table-striped table-bordered">
<tr>
<th colspan="3" width="200">风险等级</th>
<th colspan="3" width="200">{safe_check_level}</th>
</tr>
{html_tag}
</table>
"""
return message
def miningFileProgressCheck(self):
data = self.json_params.get('data').get('eventLevel').get('miningFileProgressCheck')
safe_check_level = ''
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
for level in self.level:
if level.get('key') == data.get('result'):
safe_check_level = level.get('value')
details = ['<li><font color="black">{}</font></li>'.format(i) for i in data.get('Details')]
html_tag = ' '.join(details)
message = f"""
<h4>挖矿文件/进程检查</h4>
<table class="table table-striped table-bordered">
<tr>
<th width="200">风险等级</th>
<th width="200">{safe_check_level}</th>
</tr>
<tr>
<td>详情</td>
<td>
<ul>
{html_tag}
</ul>
</td>
</tr>
</table>
"""
return message
def systemLevel(self):
return "<center><h3>系统级安全检测</h3></center>"
def usersLevel(self):
return "<center><h3>用户级安全检测</h3></center>"
def fileLevel(self):
return "<center><h3>文件级安全检测</h3></center>"
def processLevel(self):
return "<center><h3>进程级安全检测</h3></center>"
def eventLevel(self):
return "<center><h3>事件级安全检测</h3></center>"
def create(self):
# 设置文件名及创建html主体结构
filename = '{}.html'.format('主机安全评估检测报告')
self.create_file(filename, self.html_body())
# 安全合规检测概览
self.replace(filename, '{{safeCheckOverview}}', self.safeCheckOverview())
# 调用html生成函数
data = self.json_params.get('data')
for level in list(data.keys()):
self.replace(filename, '{{%s}}' % level, eval("self.%s()" % level))
for key in list(data.get(level).keys()):
self.replace(filename, '{{%s}}' % key, eval("self.%s()" % key))
# 清空变量
clear_variable = [
"{{safeCheckOverview}}", "{{systemLevel}}", "{{systemAccountCheck}}",
"{{remoteLoginCheck}}", "{{opensslVersionCheck}}", "{{opensshVersionCheck}}",
"{{usersLevel}}", "{{nonSystemDefaultUsersCheck}}", "{{userAuthorityCheck}}",
"{{systemCommandModifyCheck}}", "{{sshForceAttackCheck}}", "{{inetdBackDoorCheck}}",
"{{historyCommandCheck}}", "{{fileLevel}}", "{{crontabCheck}}", "{{eventLevel}}",
"{{maliciousFileCheck}}", "{{inetdConfBackDoorFileCheck}}", "{{processLevel}}",
"{{maliciousProcessCheck}}", "{{portListenCheck}}", "{{miningFileProgressCheck}}",
]
for clear in clear_variable:
self.replace(filename, clear, '')
if __name__ == '__main__':
html = Html()
html.create()
# python3 test.py --resultFields systemAccountCheck,remoteLoginCheck,opensslVersionCheck,opensshVersionCheck,nonSystemDefaultUsersCheck,userAuthorityCheck,systemCommandModifyCheck,sshForceAttackCheck,inetdBackDoorCheck,maliciousFileCheck,inetdConfBackDoorFileCheck,crontabCheck,maliciousProcessCheck,portListenCheck,miningFileProgressCheck,historyCommandCheck --userWhiteList 'test qwe',wangze --portWhiteList 123,332 --systemWhiteList wqe --commandWhiteList 'abc 2',rr