Compare commits
7 Commits
Author | SHA1 | Date | |
---|---|---|---|
2435899033 | |||
e53bb1eadd | |||
1bfdc82fd2 | |||
589b5b28af | |||
14b12f22ac | |||
17f138d550 | |||
5aa06c1d6a |
1391
sio2/CYBER/Nagios/nagios.cfg
Normal file
1391
sio2/CYBER/Nagios/nagios.cfg
Normal file
File diff suppressed because it is too large
Load Diff
50
sio2/CYBER/Nagios/nagios4.conf
Normal file
50
sio2/CYBER/Nagios/nagios4.conf
Normal file
@ -0,0 +1,50 @@
|
||||
# apache configuration for nagios 4.x
|
||||
|
||||
ScriptAlias /cgi-bin/nagios4 /usr/lib/cgi-bin/nagios4
|
||||
ScriptAlias /nagios4/cgi-bin /usr/lib/cgi-bin/nagios4
|
||||
|
||||
# Where the stylesheets (config files) reside
|
||||
Alias /nagios4/stylesheets /etc/nagios4/stylesheets
|
||||
|
||||
# Where the HTML pages live
|
||||
Alias /nagios4 /usr/share/nagios4/htdocs
|
||||
|
||||
<DirectoryMatch (/usr/share/nagios4/htdocs|/usr/lib/cgi-bin/nagios4|/etc/nagios4/stylesheets)>
|
||||
Options FollowSymLinks
|
||||
DirectoryIndex index.php index.html
|
||||
AllowOverride AuthConfig
|
||||
#
|
||||
# The default Debian nagios4 install sets use_authentication=0 in
|
||||
# /etc/nagios4/cgi.cfg, which turns off nagos's internal authentication.
|
||||
# This is insecure. As a compromise this default apache2 configuration
|
||||
# only allows private IP addresses access.
|
||||
#
|
||||
# The <Files>...</Files> below shows how you can secure the nagios4
|
||||
# web site so anybody can view it, but only authenticated users can issue
|
||||
# commands (such as silence notifications). To do that replace the
|
||||
# "Require all granted" with "Require valid-user", and use htdigest
|
||||
# program from the apache2-utils package to add users to
|
||||
# /etc/nagios4/htdigest.users.
|
||||
#
|
||||
# A step up is to insist all users validate themselves by moving
|
||||
# the stanza's in the <Files>..<Files> into the <DirectoryMatch>.
|
||||
# Then by setting use_authentication=1 in /etc/nagios4/cgi.cfg you
|
||||
# can configure which people get to see a particular service from
|
||||
# within the nagios configuration.
|
||||
#
|
||||
Require ip ::1/128 fc00::/7 fe80::/10 10.0.0.0/8 127.0.0.0/8 169.254.0.0/16 172.16.0.0/12 192.168.0.0/16
|
||||
<Files "cmd.cgi">
|
||||
AuthDigestDomain "Nagios4"
|
||||
AuthDigestProvider file
|
||||
AuthUserFile "/etc/nagios4/htdigest.users"
|
||||
AuthGroupFile "/etc/group"
|
||||
AuthName "Nagios4"
|
||||
AuthType Digest
|
||||
Require all granted
|
||||
#Require valid-user
|
||||
</Files>
|
||||
</DirectoryMatch>
|
||||
|
||||
<Directory /usr/share/nagios4/htdocs>
|
||||
Options +ExecCGI
|
||||
</Directory>
|
30
sio2/CYBER/Nagios/srv.cfg
Normal file
30
sio2/CYBER/Nagios/srv.cfg
Normal file
@ -0,0 +1,30 @@
|
||||
define host {
|
||||
use linux-server ; Name of host template to use
|
||||
host_name srv
|
||||
alias srv
|
||||
address 172.20.10.11
|
||||
}
|
||||
define service{
|
||||
use generic-service
|
||||
host_name srv
|
||||
service_description WWW
|
||||
check_command check_http
|
||||
}
|
||||
define service{
|
||||
use generic-service
|
||||
host_name srv
|
||||
service_description SSH
|
||||
check_command check_ssh
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
72
sio2/SISR/FOG/dhcpd.conf
Normal file
72
sio2/SISR/FOG/dhcpd.conf
Normal file
@ -0,0 +1,72 @@
|
||||
# DHCP Server Configuration file\n#see /usr/share/doc/dhcp*/dhcpd.conf.sample
|
||||
# This file was created by FOG
|
||||
#Definition of PXE-specific options
|
||||
# Code 1: Multicast IP Address of bootfile
|
||||
# Code 2: UDP Port that client should monitor for MTFTP Responses
|
||||
# Code 3: UDP Port that MTFTP servers are using to listen for MTFTP requests
|
||||
# Code 4: Number of seconds a client must listen for activity before trying
|
||||
# to start a new MTFTP transfer
|
||||
# Code 5: Number of seconds a client must listen before trying to restart
|
||||
# a MTFTP transfer
|
||||
option space PXE;
|
||||
option PXE.mtftp-ip code 1 = ip-address;
|
||||
option PXE.mtftp-cport code 2 = unsigned integer 16;
|
||||
option PXE.mtftp-sport code 3 = unsigned integer 16;
|
||||
option PXE.mtftp-tmout code 4 = unsigned integer 8;
|
||||
option PXE.mtftp-delay code 5 = unsigned integer 8;
|
||||
option arch code 93 = unsigned integer 16;
|
||||
use-host-decl-names on;
|
||||
ddns-update-style interim;
|
||||
ignore client-updates;
|
||||
# Specify subnet of ether device you do NOT want service.
|
||||
# For systems with two or more ethernet devices.
|
||||
# subnet 136.165.0.0 netmask 255.255.0.0 {}
|
||||
subnet 192.168.1.0 netmask 255.255.255.0{
|
||||
option subnet-mask 255.255.255.0;
|
||||
range dynamic-bootp 192.168.1.10 192.168.1.254;
|
||||
default-lease-time 21600;
|
||||
max-lease-time 43200;
|
||||
option routers 192.168.1.1;
|
||||
option domain-name-servers 10.121.38.7;
|
||||
next-server 192.168.1.10;
|
||||
}
|
||||
class "Legacy" {
|
||||
match if substring(option vendor-class-identifier, 0, 20) = "PXEClient:Arch:00000";
|
||||
filename "undionly.kkpxe";
|
||||
}
|
||||
class "UEFI-32-2" {
|
||||
match if substring(option vendor-class-identifier, 0, 20) = "PXEClient:Arch:00002";
|
||||
filename "i386-efi/snponly.efi";
|
||||
}
|
||||
class "UEFI-32-1" {
|
||||
match if substring(option vendor-class-identifier, 0, 20) = "PXEClient:Arch:00006";
|
||||
filename "i386-efi/snponly.efi";
|
||||
}
|
||||
class "UEFI-64-1" {
|
||||
match if substring(option vendor-class-identifier, 0, 20) = "PXEClient:Arch:00007";
|
||||
filename "snponly.efi";
|
||||
}
|
||||
class "UEFI-64-2" {
|
||||
match if substring(option vendor-class-identifier, 0, 20) = "PXEClient:Arch:00008";
|
||||
filename "snponly.efi";
|
||||
}
|
||||
class "UEFI-64-3" {
|
||||
match if substring(option vendor-class-identifier, 0, 20) = "PXEClient:Arch:00009";
|
||||
filename "snponly.efi";
|
||||
}
|
||||
class "SURFACE-PRO-4" {
|
||||
match if substring(option vendor-class-identifier, 0, 32) = "PXEClient:Arch:00007:UNDI:003016";
|
||||
filename "snponly.efi";
|
||||
}
|
||||
class "Apple-Intel-Netboot" {
|
||||
match if substring(option vendor-class-identifier, 0, 14) = "AAPLBSDPC/i386";
|
||||
option dhcp-parameter-request-list 1,3,17,43,60;
|
||||
if (option dhcp-message-type = 8) {
|
||||
option vendor-class-identifier "AAPLBSDPC";
|
||||
if (substring(option vendor-encapsulated-options, 0, 3) = 01:01:01) {
|
||||
# BSDP List
|
||||
option vendor-encapsulated-options 01:01:01:04:02:80:00:07:04:81:00:05:2a:09:0D:81:00:05:2a:08:69:50:58:45:2d:46:4f:47;
|
||||
filename "snponly.efi";
|
||||
}
|
||||
}
|
||||
}
|
109
sio2/SISR/PXE/dhcpd.conf
Normal file
109
sio2/SISR/PXE/dhcpd.conf
Normal file
@ -0,0 +1,109 @@
|
||||
# dhcpd.conf
|
||||
#
|
||||
# Sample configuration file for ISC dhcpd
|
||||
#
|
||||
|
||||
# option definitions common to all supported networks...
|
||||
option domain-name "192.168.1.1";
|
||||
option domain-name-servers 192.168.1.1;
|
||||
|
||||
default-lease-time 600;
|
||||
max-lease-time 7200;
|
||||
|
||||
# The ddns-updates-style parameter controls whether or not the server will
|
||||
# attempt to do a DNS update when a lease is confirmed. We default to the
|
||||
# behavior of the version 2 packages ('none', since DHCP v2 didn't
|
||||
# have support for DDNS.)
|
||||
ddns-update-style none;
|
||||
|
||||
# If this DHCP server is the official DHCP server for the local
|
||||
# network, the authoritative directive should be uncommented.
|
||||
#authoritative;
|
||||
|
||||
# Use this to send dhcp log messages to a different log file (you also
|
||||
# have to hack syslog.conf to complete the redirection).
|
||||
#log-facility local7;
|
||||
|
||||
# No service will be given on this subnet, but declaring it helps the
|
||||
# DHCP server to understand the network topology.
|
||||
|
||||
#subnet 10.152.187.0 netmask 255.255.255.0 {
|
||||
#}
|
||||
|
||||
# This is a very basic subnet declaration.
|
||||
|
||||
subnet 192.168.1.0 netmask 255.255.255.0 {
|
||||
range 192.168.1.20 192.168.1.50;
|
||||
option routers 192.168.1.1;
|
||||
option domain-name "sio.lan";
|
||||
filename "pxelinux.0";
|
||||
next-server 192.168.1.1;
|
||||
}
|
||||
|
||||
# This declaration allows BOOTP clients to get dynamic addresses,
|
||||
# which we don't really recommend.
|
||||
|
||||
#subnet 10.254.239.32 netmask 255.255.255.224 {
|
||||
# range dynamic-bootp 10.254.239.40 10.254.239.60;
|
||||
# option broadcast-address 10.254.239.31;
|
||||
# option routers rtr-239-32-1.example.org;
|
||||
#}
|
||||
|
||||
# A slightly different configuration for an internal subnet.
|
||||
#subnet 10.5.5.0 netmask 255.255.255.224 {
|
||||
# range 10.5.5.26 10.5.5.30;
|
||||
# option domain-name-servers ns1.internal.example.org;
|
||||
# option domain-name "internal.example.org";
|
||||
# option routers 10.5.5.1;
|
||||
# option broadcast-address 10.5.5.31;
|
||||
# default-lease-time 600;
|
||||
# max-lease-time 7200;
|
||||
#}
|
||||
|
||||
# Hosts which require special configuration options can be listed in
|
||||
# host statements. If no address is specified, the address will be
|
||||
# allocated dynamically (if possible), but the host-specific information
|
||||
# will still come from the host declaration.
|
||||
|
||||
#host passacaglia {
|
||||
# hardware ethernet 0:0:c0:5d:bd:95;
|
||||
# server-name "toccata.example.com";
|
||||
#}
|
||||
|
||||
# Fixed IP addresses can also be specified for hosts. These addresses
|
||||
# should not also be listed as being available for dynamic assignment.
|
||||
# Hosts for which fixed IP addresses have been specified can boot using
|
||||
# BOOTP or DHCP. Hosts for which no fixed address is specified can only
|
||||
# be booted with DHCP, unless there is an address range on the subnet
|
||||
# to which a BOOTP client is connected which has the dynamic-bootp flag
|
||||
# set.
|
||||
#host fantasia {
|
||||
# hardware ethernet 08:00:07:26:c0:a5;
|
||||
# fixed-address fantasia.example.com;
|
||||
#}
|
||||
|
||||
# You can declare a class of clients and then do address allocation
|
||||
# based on that. The example below shows a case where all clients
|
||||
# in a certain class get addresses on the 10.17.224/24 subnet, and all
|
||||
# other clients get addresses on the 10.0.29/24 subnet.
|
||||
|
||||
#class "foo" {
|
||||
# match if substring (option vendor-class-identifier, 0, 4) = "SUNW";
|
||||
#}
|
||||
|
||||
#shared-network 224-29 {
|
||||
# subnet 10.17.224.0 netmask 255.255.255.0 {
|
||||
# option routers rtr-224.example.org;
|
||||
# }
|
||||
# subnet 10.0.29.0 netmask 255.255.255.0 {
|
||||
# option routers rtr-29.example.org;
|
||||
# }
|
||||
# pool {
|
||||
# allow members of "foo";
|
||||
# range 10.17.224.10 10.17.224.250;
|
||||
# }
|
||||
# pool {
|
||||
# deny members of "foo";
|
||||
# range 10.0.29.10 10.0.29.230;
|
||||
# }
|
||||
#}
|
3
sio2/SISR/PXE/enp0s3
Normal file
3
sio2/SISR/PXE/enp0s3
Normal file
@ -0,0 +1,3 @@
|
||||
# generated by FAI
|
||||
auto enp0s3
|
||||
iface enp0s3 inet dhcp
|
5
sio2/SISR/PXE/enp0s8
Normal file
5
sio2/SISR/PXE/enp0s8
Normal file
@ -0,0 +1,5 @@
|
||||
# generated by FAI
|
||||
auto enp0s8
|
||||
iface enp0s8 inet static
|
||||
address 192.168.1.1/24
|
||||
up /root/nat.sh
|
18
sio2/SISR/PXE/isc-dhcp-server
Normal file
18
sio2/SISR/PXE/isc-dhcp-server
Normal file
@ -0,0 +1,18 @@
|
||||
# Defaults for isc-dhcp-server (sourced by /etc/init.d/isc-dhcp-server)
|
||||
|
||||
# Path to dhcpd's config file (default: /etc/dhcp/dhcpd.conf).
|
||||
#DHCPDv4_CONF=/etc/dhcp/dhcpd.conf
|
||||
#DHCPDv6_CONF=/etc/dhcp/dhcpd6.conf
|
||||
|
||||
# Path to dhcpd's PID file (default: /var/run/dhcpd.pid).
|
||||
#DHCPDv4_PID=/var/run/dhcpd.pid
|
||||
#DHCPDv6_PID=/var/run/dhcpd6.pid
|
||||
|
||||
# Additional options to start dhcpd with.
|
||||
# Don't use options -cf or -pf here; use DHCPD_CONF/ DHCPD_PID instead
|
||||
#OPTIONS=""
|
||||
|
||||
# On what interfaces should the DHCP server (dhcpd) serve DHCP requests?
|
||||
# Separate multiple interfaces with spaces, e.g. "eth0 eth1".
|
||||
INTERFACESv4="enp0s8"
|
||||
INTERFACESv6=""
|
4
sio2/SISR/PXE/nat.sh
Normal file
4
sio2/SISR/PXE/nat.sh
Normal file
@ -0,0 +1,4 @@
|
||||
#!/bin/bash
|
||||
echo "1"> /proc/sys/net/ipv4/ip_forward
|
||||
iptables -t nat -A POSTROUTING -o enp0s3 -j MASQUERADE
|
||||
iptables -t nat -A POSTROUTING -o enp0s8 -j MASQUERADE
|
71
sio2/SISR/RSYSLOG/rsyslog.con.emeteur
Normal file
71
sio2/SISR/RSYSLOG/rsyslog.con.emeteur
Normal file
@ -0,0 +1,71 @@
|
||||
# /etc/rsyslog.conf configuration file for rsyslog
|
||||
#
|
||||
# For more information install rsyslog-doc and see
|
||||
# /usr/share/doc/rsyslog-doc/html/configuration/index.html
|
||||
|
||||
|
||||
#################
|
||||
#### MODULES ####
|
||||
#################
|
||||
|
||||
module(load="imuxsock") # provides support for local system logging
|
||||
module(load="imklog") # provides kernel logging support
|
||||
#module(load="immark") # provides --MARK-- message capability
|
||||
|
||||
# provides UDP syslog reception
|
||||
#module(load="imudp") MACHINE DE RECEPTION
|
||||
#input(type="imudp" port="514") MACHINE DE RECEPTION
|
||||
|
||||
# provides TCP syslog reception
|
||||
#module(load="imtcp")
|
||||
#input(type="imtcp" port="514")
|
||||
|
||||
|
||||
###########################
|
||||
#### GLOBAL DIRECTIVES ####
|
||||
###########################
|
||||
|
||||
#
|
||||
# Set the default permissions for all log files.
|
||||
#
|
||||
$FileOwner root
|
||||
$FileGroup adm
|
||||
$FileCreateMode 0640
|
||||
$DirCreateMode 0755
|
||||
$Umask 0022
|
||||
|
||||
#
|
||||
# Where to place spool and state files
|
||||
#
|
||||
$WorkDirectory /var/spool/rsyslog
|
||||
|
||||
#
|
||||
# Include all config files in /etc/rsyslog.d/
|
||||
#
|
||||
$IncludeConfig /etc/rsyslog.d/*.conf
|
||||
|
||||
|
||||
###############
|
||||
#### RULES ####
|
||||
###############
|
||||
|
||||
#
|
||||
# Log anything besides private authentication messages to a single log file
|
||||
#
|
||||
*.*;auth,authpriv.none -/var/log/syslog
|
||||
|
||||
#
|
||||
# Log commonly used facilities to their own log file
|
||||
#
|
||||
auth,authpriv.* /var/log/auth.log
|
||||
cron.* -/var/log/cron.log
|
||||
kern.* -/var/log/kern.log
|
||||
mail.* -/var/log/mail.log
|
||||
user.* -/var/log/user.log
|
||||
|
||||
#
|
||||
# Emergencies are sent to everybody logged in.
|
||||
#
|
||||
*.emerg :omusrmsg:*
|
||||
*.* @192.168.0.21:514 # exporte tous les logs de toute gravité et de toute origine vers l'adresse 192.168.100 port UDP 514
|
||||
*.* @192.168.0.32:514 # exporte tous les logs de toute gravité et de toute origine vers l'adresse 192.168.100 port UDP 514
|
38
sio2/VAGRANT/Vagrantfile
vendored
38
sio2/VAGRANT/Vagrantfile
vendored
@ -1,14 +1,32 @@
|
||||
# -*- mode: ruby -*-
|
||||
# vi: set ft=ruby :
|
||||
|
||||
Vagrant.configure("2") do |config|
|
||||
config.vm.provision "shell", inline: "apt-get update -y" # execute pour chacune des machines
|
||||
|
||||
config.vm.define "IDS" do |ids|#VM No'1
|
||||
ids.vm.box = "debian/bookworm64" #Setting machine type
|
||||
ids.vm.hostname = "IDS" #Setting machine type
|
||||
ids.vm.network "public_network"#Set DHCP
|
||||
ids.vm.provision "shell", inline: <<-SHELL
|
||||
apt-get install -y wget curl vim unzip chkrootkit rkhunter fail2ban
|
||||
# The most common configuration options are documented and commented below.
|
||||
# For a complete reference, please see the online documentation at
|
||||
# https://docs.vagrantup.com.
|
||||
|
||||
# Every Vagrant development environment requires a box. You can search for
|
||||
# boxes at https://vagrantcloud.com/search.
|
||||
config.vm.box = "debian/bookworm64"
|
||||
config.vm.hostname = "nagios4"
|
||||
|
||||
# Disable automatic box update checking. If you disable this, then
|
||||
# boxes will only be checked for updates when the user runs
|
||||
# `vagrant box outdated`. This is not recommended.
|
||||
# config.vm.box_check_update = false
|
||||
|
||||
# Create a public network, which generally matched to bridged network.
|
||||
# Bridged networks make the machine appear as another physical device on
|
||||
# your network.
|
||||
config.vm.network "public_network"
|
||||
|
||||
config.vm.provision "shell", inline: <<-SHELL
|
||||
apt-get update
|
||||
apt-get install -y vim curl wget apache2 php nagios4 nagios-plugins-contrib
|
||||
cp /etc/nagios4/apache2.conf /etc/apache2/sites-available/nagios4.conf
|
||||
a2ensite nagios4.conf
|
||||
a2enmod rewrite cgi
|
||||
systemctl reload apache2
|
||||
SHELL
|
||||
end
|
||||
end
|
||||
end
|
14
sio2/VAGRANT/Vagrantfile2
Normal file
14
sio2/VAGRANT/Vagrantfile2
Normal file
@ -0,0 +1,14 @@
|
||||
# -*- mode: ruby -*-
|
||||
# vi: set ft=ruby :
|
||||
Vagrant.configure("2") do |config|
|
||||
config.vm.provision "shell", inline: "apt-get update -y" # execute pour chacune des machines
|
||||
|
||||
config.vm.define "IDS" do |ids|#VM No'1
|
||||
ids.vm.box = "debian/bookworm64" #Setting machine type
|
||||
ids.vm.hostname = "IDS" #Setting machine type
|
||||
ids.vm.network "public_network"#Set DHCP
|
||||
ids.vm.provision "shell", inline: <<-SHELL
|
||||
apt-get install -y wget curl vim unzip chkrootkit rkhunter fail2ban
|
||||
SHELL
|
||||
end
|
||||
end
|
Reference in New Issue
Block a user