Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/franckferman/lastlog-audit
๐ LastLog Audit: Security Login Activity Analyzer.
https://github.com/franckferman/lastlog-audit
Last synced: 2 days ago
JSON representation
๐ LastLog Audit: Security Login Activity Analyzer.
- Host: GitHub
- URL: https://github.com/franckferman/lastlog-audit
- Owner: franckferman
- License: agpl-3.0
- Created: 2022-08-06T17:13:49.000Z (over 2 years ago)
- Default Branch: stable
- Last Pushed: 2024-04-05T01:35:37.000Z (8 months ago)
- Last Synced: 2024-04-05T02:10:39.961Z (8 months ago)
- Language: Python
- Homepage: https://github.com/franckferman/lastlog-audit/
- Size: 271 KB
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
[![Contributors][contributors-shield]](https://github.com/franckferman/LastLog-Audit/graphs/contributors)
[![Forks][forks-shield]](https://github.com/franckferman/LastLog-Audit/network/members)
[![Stargazers][stars-shield]](https://github.com/franckferman/LastLog-Audit/stargazers)
[![Issues][issues-shield]](https://github.com/franckferman/LastLog-Audit/issues)
[![License][license-shield]](https://github.com/franckferman/LastLog-Audit/blob/stable/LICENSE)๐ LastLog Audit: Security Login Activity Analyzer.
Analyzing system login activities for security audits and compliance.
LastLog Audit offers a comprehensive and customizable solution for analyzing login activities on Linux/Unix systems. Designed for system administrators and security professionals, it facilitates security audits, compliance checks, and forensic investigations with ease.
๐ Explore the full documentation
ยท
๐ Report Bug
ยท
๐ ๏ธ Request Feature## ๐ Table of Contents
Click to collapse/expand
- ๐ About
- ๐ ๏ธ Installation
- ๐ฎ Usage
- โ Troubleshooting
- ๐ค Contributing
- ๐ Star Evolution
- ๐ License
- ๐ Contact
## ๐ About
**LastLog Audit: Security Login Activity Analyzer** _Enhance your security audits and compliance checks._
`LastLog-Audit` offers a comprehensive solution for analyzing system login activities, designed to assist in security audits, compliance checks, and forensic investigations on Linux/Unix systems. This tool parses `/var/log/lastlog` to provide detailed and customizable reports on user login activities, making it an indispensable asset for system administrators and security professionals.
Discover the potential of `LastLog-Audit` in streamlining your security processes. Whether it's for enhancing security protocols, ensuring compliance, or conducting detailed forensic analyses, `LastLog-Audit` brings robustness and ease to the management of login activity data. Dive into a new level of audit efficiency and control with `LastLog-Audit`. Begin your journey towards more secure and compliant systems today.
## ๐ Installation
Setting up `LastLog-Audit` is streamlined for ease of use. Please follow the guidelines below to ensure you meet the necessary prerequisites before installation.
### Prerequisites
`LastLog-Audit` is developed for Linux/Unix environments, focusing on delivering a robust login activity analysis tool. Here's what you need to know about its compatibility:
Ensure Python 3.11.2 or newer is installed on your system. You can check your current Python version by running `python3 --version` in your terminal. If you need to upgrade or install Python, use your distribution's package manager or visit the official [Python website](https://www.python.org/downloads/) for more detailed instructions.
> โ ๏ธ **Note**: `LastLog-Audit` has been rigorously tested on **Ubuntu 23.10 x64**. This testing was conducted using **Python 3.11.2**. While `LastLog-Audit` is expected to function on other Unix-like systems and versions of Python above 3.6, Ubuntu 23.10 x64 with Python 3.11.2 is the recommended setup for the most reliable experience.
### Getting LastLog-Audit
To get started with LastLog Audit, you can choose from downloading it directly, cloning the repo, or using a command to pull the latest version. Here's how:
Option 1: **Using wget or curl**
For a quick setup, you can download the main script using wget or curl:
```bash
# Using wget
wget https://raw.githubusercontent.com/franckferman/LastLog-Audit/stable/LastLog-Audit.py# Or using curl
curl -O https://raw.githubusercontent.com/franckferman/LastLog-Audit/stable/LastLog-Audit.py
```Option 2: **Clone with Git**
First, ensure you have Git installed on your system. Open your favorite terminal and run the following command to clone the repository:
```bash
git clone https://github.com/franckferman/LastLog-Audit.git
```This method clones the entire project to your local machine.
Option 3: **Direct Download** from GitHub
If you prefer not using Git, you can download the project directly:Visit the project's page at `https://github.com/franckferman/LastLog-Audit`.
Click on the `<> Code` button, then select `Download ZIP`.
After downloading, extract the ZIP file to your preferred location.Whichever method you choose, ensure Python 3 is installed on your system to run LastLog Audit successfully.
## ๐ฎ Usage
Using `LastLog Audit` is straightforward, enabling you to analyze system login activities efficiently. Here's how to get started:
### **Getting started**
To run `LastLog Audit`, execute the following command in your terminal, adjusting the script name as necessary:
```bash
python3 LastLog-Audit.py
```### Usage Options
`LastLog Audit` comes with a variety of options to customize its output and functionality. Hereโs a quick overview:
- --file FILE: Specifies the path to the lastlog file. The default is /var/log/lastlog.
- --display {table,line}: Chooses between tabular (table) and line-by-line (line) output formats. The default is table.
- --include-username: Includes usernames in the output. Note: This is accurate only when run on the target system due to UID mapping.
- --export EXPORT: Specifies the path for exporting the data. If left unspecified, the output is displayed in the console.
- --export-format {txt,csv}: Determines the format for exported data (txt or csv). This option requires --export to be set.### Examples
Here are a few examples to illustrate common `LastLog Audit` usage scenarios:
Analyze and display last login activities in a table format (default behavior):
```bash
python3 LastLog-Audit.py
```Export last login activities to a CSV file:
```bash
python3 LastLog-Audit.py --export ~/output.csv --export-format csv
```Include usernames and display output in line-by-line format:
```bash
python3 LastLog-Audit.py --include-username --display line
```For more details on all available options, run `python3 LastLog-Audit.py -h`.
## ๐ง Troubleshooting
Encountering issues? Don't worry. If you come across any problems or have questions, please don't hesitate to submit a ticket for assistance: [Submit an issue on GitHub](https://github.com/franckferman/LastLog-Audit/issues)
## ๐ค Contributing
We truly appreciate and welcome community involvement. Your contributions, feedback, and suggestions play a crucial role in improving the project for everyone. If you're interested in contributing or have ideas for enhancements, please feel free to open an issue or submit a pull request on our GitHub repository. Every contribution, no matter how big or small, is highly valued and greatly appreciated!
## ๐ Star Evolution
Explore the star history of this project and see how it has evolved over time:
Your support is greatly appreciated. We're grateful for every star! Your backing fuels our passion. โจ
## ๐ License
This project is licensed under the GNU Affero General Public License, Version 3.0. For more details, please refer to the LICENSE file in the repository: [Read the license on GitHub](https://github.com/franckferman/LastLog-Audit/blob/stable/LICENSE)
## ๐ Contact
[![ProtonMail][protonmail-shield]](mailto:[email protected])
[![LinkedIn][linkedin-shield]](https://www.linkedin.com/in/franckferman)
[![Twitter][twitter-shield]](https://www.twitter.com/franckferman)[contributors-shield]: https://img.shields.io/github/contributors/franckferman/LastLog-Audit.svg?style=for-the-badge
[contributors-url]: https://github.com/franckferman/LastLog-Audit/graphs/contributors
[forks-shield]: https://img.shields.io/github/forks/franckferman/LastLog-Audit.svg?style=for-the-badge
[forks-url]: https://github.com/franckferman/LastLog-Audit/network/members
[stars-shield]: https://img.shields.io/github/stars/franckferman/LastLog-Audit.svg?style=for-the-badge
[stars-url]: https://github.com/franckferman/LastLog-Audit/stargazers
[issues-shield]: https://img.shields.io/github/issues/franckferman/LastLog-Audit.svg?style=for-the-badge
[issues-url]: https://github.com/franckferman/LastLog-Audit/issues
[license-shield]: https://img.shields.io/github/license/franckferman/LastLog-Audit.svg?style=for-the-badge
[license-url]: https://github.com/franckferman/LastLog-Audit/blob/stable/LICENSE
[protonmail-shield]: https://img.shields.io/badge/ProtonMail-8B89CC?style=for-the-badge&logo=protonmail&logoColor=blueviolet
[linkedin-shield]: https://img.shields.io/badge/-LinkedIn-black.svg?style=for-the-badge&logo=linkedin&colorB=blue
[twitter-shield]: https://img.shields.io/badge/-Twitter-black.svg?style=for-the-badge&logo=twitter&colorB=blue