Skip to content
This repository has been archived by the owner on Feb 8, 2018. It is now read-only.

Possible to watch background process activation? (Example: Ostiarius) #19

Closed
JayBrown opened this issue Apr 27, 2016 · 3 comments
Closed

Comments

@JayBrown
Copy link

JayBrown commented Apr 27, 2016

I'm using the Ostiarius background process by Objective-See to block the execution of unsigned apps/binaries, and the system.log entries look like this:
27/04/16 15:07:03,000 kernel[0]: OSTIARIUS: /Applications/APP_NAME.app/Contents/MacOS/APP_BINARYNAME is from the internet & is unsigned -> BLOCKING!
Is there a way to monitor this? I tried adding "OSTIARIUS:" into the settings file, but that didn't do the trick.

@JayBrown
Copy link
Author

Just saw the parsers directory; so the settings.py file would have this line:
'/var/log/system.log': ('sudo', 'ssh', 'portscan', 'ostiarius'),
…while there's an additional file ostiarius.py in /parsers, or am I wrong?

@pirate
Copy link
Owner

pirate commented Apr 27, 2016

#18

@pirate
Copy link
Owner

pirate commented Apr 27, 2016

Download the release with the new Ostiarius parser here: https://github.com/pirate/security-growler/releases/tag/v2.2

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants