PAM log-credentials has been written by José Miguel Silva Caldeira miguel@ncdc.pt.
PAM log-credentials allows you to log credentials. It will log messages like that: May 22 18:50:15 localhost log-credentials: host=xxx.xxx.xxx.xxx service=sshd user=root pass=xxxxxxx.
The idea of this module is to facilitate obtaining information that allows you to analyze brute force attacks on ssh and other services.
Through these data, with scripts and in a simple way it is possible to perceive:
- From where the attacks are initiated, the countries, the networks, etc. Through IP;
- You can see which users are most used in login attempts;
- The type of passwords that are used in attack attempts;
- Among others.
In this way it is possible for the administrator to be aware and to take measures so that good practices are taken to avoid these attacks.
Use at your own risk!
Do not use on a production system where multiple users have access to the logs. If you do, everyone has access to all credentials.
If you still want to do so, configure the log file access permissions.
Since this module logs all the credentials it is clear that it also logs the correct ones.
This module can be used as "KeyLogger" if it is badly installed on some system.
My intention is to use it for study purposes but stay of the conscience of each one uses it for a certain purpose.
Be cool!
You can clone the repository wherever you want. (I like to keep it in ~/Projects/log-credentials
.)
$ cd ~/Projects
$ git clone https://github.com/jomisica/log-credentials.git
In order to compile this software it is necessary to first install the dependencies. This will depend on the system in question below is the example for CentOS and Ubuntu.
In CentOS it is necessary to install the "Development Tools" group that installs the necessary software to compile this software.
It is also necessary to install the package "pam-devel" that has the necessary headers so that it is possible to develop modules for the PAM in the system that we use.
# yum group install "Development Tools"
# yum install pam-devel
In Ubuntu it is necessary to install the software dependent to compile this software.
It is also necessary to install the package "libpam0g-dev" that has the necessary headers so that it is possible to develop modules for the PAM in the system that we use.
# apt-get build-dep pam
# apt-get install libpam0g-dev
$ cd log-credentials
$ libtoolize --force
$ aclocal
$ autoheader
$ automake --force-missing --add-missing
$ autoconf
The directory where the PAM modules are installed are different in several systems as such we have to pass the correct directory when configuring.
$ ./configure --with-pam-dir=/lib64/security
$ ./configure --with-pam-dir=/lib/x86_64-linux-gnu/security
$ make
# make install
In order for the module to work we need to add the following line to the /etc/pam.d/sshd configuration file before any other module or file inclosion.
auth optional log_credentials.so
It's done!
If you find any bugs or problems just mail me José Miguel Silva Caldeira miguel@ncdc.pt