Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Heist creates network tunnels for distributing and managing agents. While it has been originally built to deploy and manage Salt Minions, it can be used to distribute and manage other agents or plugins if extended to do so.
Using Heist is very easy, Start by downloading Heist. Just install via
pip
:
.. code-block:: bash
pip install heist
In order to run Heist you will need to specify a Heist manager. An example of a
heist manager is salt.minion
but this will require a user to install the
heist-salt <https://heist-salt.readthedocs.io/en/latest/>
_ project:
.. code-block:: bash
pip install heist-salt
A Roster is a file used by Heist to map login information to the
systems in your environment. This file can be very simple and just
needs to tell Heist where your systems are and how to log into them
via ssh. Open a file called roster.cfg
and add the data needed to connect
to a remote system via ssh:
.. code-block:: yaml
system_name:
host: 192.168.4.4
username: fred
password: freds_password
.. note::
This example is very simple, heist supports virtually all available authentication
options for ssh.
The roster files typically all live inside of a roster directory. But to get
started we will execute a single roster file with Heist using the salt.minion
Heist
manager:
.. code-block:: bash
heist salt.minion -R roster.cfg
Assuming your roster is correct, heist will now connect to the remote
system and deploy the salt.minion
binary.
Heist is able to automatically clean up as well! Just soft kill your heist application and it will reach out to all connections, tell them to remove the deployed artifacts from the target systems and stop the service! Like a proper heist these should be no evidence left behind!
If you want to use Heist to deploy and manage Salt, you will need to install
heist-salt <https://heist-salt.readthedocs.io/en/latest/>
_.
If you want to read more about how to use Heist and its internals please take a look at Heist's documentation here: https://heist.readthedocs.io/en/latest/
FAQs
Pluggable ephemeral software tunneling and delivery system
We found that heist demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.