Security News
tea.xyz Spam Plagues npm and RubyGems Package Registries
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
Readme
Heist creates network tunnels for distributing and managing agents. While it has been originally built to deploy and manage Salt Minions, it can be used to distribute and manage other agents or plugins if extended to do so.
Using Heist is very easy, Start by downloading Heist. Just install via
pip
:
.. code-block:: bash
pip install heist
In order to run Heist you will need to specify a Heist manager. An example of a
heist manager is salt.minion
but this will require a user to install the
heist-salt <https://heist-salt.readthedocs.io/en/latest/>
_ project:
.. code-block:: bash
pip install heist-salt
A Roster is a file used by Heist to map login information to the
systems in your environment. This file can be very simple and just
needs to tell Heist where your systems are and how to log into them
via ssh. Open a file called roster.cfg
and add the data needed to connect
to a remote system via ssh:
.. code-block:: yaml
system_name:
host: 192.168.4.4
username: fred
password: freds_password
.. note::
This example is very simple, heist supports virtually all available authentication
options for ssh.
The roster files typically all live inside of a roster directory. But to get
started we will execute a single roster file with Heist using the salt.minion
Heist
manager:
.. code-block:: bash
heist salt.minion -R roster.cfg
Assuming your roster is correct, heist will now connect to the remote
system and deploy the salt.minion
binary.
Heist is able to automatically clean up as well! Just soft kill your heist application and it will reach out to all connections, tell them to remove the deployed artifacts from the target systems and stop the service! Like a proper heist these should be no evidence left behind!
If you want to use Heist to deploy and manage Salt, you will need to install
heist-salt <https://heist-salt.readthedocs.io/en/latest/>
_.
If you want to read more about how to use Heist and its internals please take a look at Heist's documentation here: https://heist.readthedocs.io/en/latest/
FAQs
Pluggable ephemeral software tunneling and delivery system
We found that heist demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
Security News
As cyber threats become more autonomous, AI-powered defenses are crucial for businesses to stay ahead of attackers who can exploit software vulnerabilities at scale.
Security News
UnitedHealth Group disclosed that the ransomware attack on Change Healthcare compromised protected health information for millions in the U.S., with estimated costs to the company expected to reach $1 billion.