Skip to content

ananya-5420/osquery-ossec-audit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

5 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

🧠 OSQuery – Command Reference for System Auditing

This repository contains essential osquery commands used for auditing a Linux system. The commands are grouped by functionality and serve as a quick reference for system monitoring, process auditing, file integrity checking, and network inspection.


πŸ“‚ What's Included

  • βœ… COMMANDS.md β€” A categorized list of SQL-like osquery commands used to:
    • Monitor system processes and memory
    • Audit installed packages and kernel modules
    • Inspect open network ports and socket activity
    • Perform file integrity monitoring (FIM)
    • Track login sessions and user activity
    • Enable event-based logging

🧱 Sections Covered in COMMANDS.md

🟦 Basic Monitoring

  • Running processes
  • Kernel version and modules
  • Installed packages (Ubuntu-based)
  • SUID binary detection

🌐 Network & Process Monitoring

  • Listening ports and open sockets
  • Interface traffic statistics
  • Gateway routing information
  • Privilege escalation detection (EUID β‰  UID)
  • Process memory consumption

πŸ›‘οΈ Event and Syslog Logging

  • Checking event-based logging status
  • Listing active query packs

πŸ› οΈ File Integrity Monitoring (FIM)

  • Tracking file creation/modification using file_events

πŸ“‹ Requirements

  • osquery installed on a Linux system (Ubuntu 20.04+ or 24.04 recommended)
  • Access to osqueryi interactive shell or osqueryd for scheduled queries

πŸ“œ Usage

Clone the repository and explore the COMMANDS.md file:

git clone https://github.com/<your-username>/osquery-command-reference.git
cd osquery-command-reference
less COMMANDS.md

About

Linux system auditing using osquery file integrity, and detect rootkits.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published