AuditD on Android Logo

AuditD on Android

0
Free
Visit Website

Our goal is to port a minimal set of userland tools from the GNU/Linux userland to the bionic/Linux userland of Android. We've stripped out most the functionality inherent in the Linux software including audisp, ausearch, and auparse. The audit stream is not sent directly to an AF_Unix socket (/dev/audit) by auditd. While not as elegant or robust as the Linux code, our goal is to provide access to the audit stream for Android applications with minimal overhead. Our choice for stripping down Audit is partly due to the fact bionic is horribly GNU incompatible, but also the smartphone platform should be treated than the traditional server/desktop due to resource and runtime constraints. Requirements: A rooted Android system. Running the 2.6.29 or higher x86 kernel with CONFIG_AUDITSYSCALL=y. For the ARM platform, the kernel must be patched (See section 'Custom Kernel'). We needed to copy over the audit.h kernel header because Google uses clean headers. Their utilities to clean headers are unusable by those not blessed with the power of Google (i.e., the documentation is minimal and the ixd is horrible). More details in the directory structure section.

FEATURES

ALTERNATIVES

A tool for SSH server auditing with comprehensive analysis capabilities.

This tutorial describes how to set up two-factor authentication for an SSH server by integrating Google Authenticator with OpenSSH.

Android port of Radamsa for generating code with Android NDK support.

A scalable python framework for security research and development teams.

AWS account compliance using centrally managed Config Rules

A company that helps organizations create security-aware teams and produce bug-free software.

Framework for creating jeopardy CTF challenges with configurable structure and efficient integration.

A public domain for use in illustrative examples in documents.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved