-
Notifications
You must be signed in to change notification settings - Fork 0
Modules
PBP provides 7 independent security modules, each with full lifecycle management.
Purpose: Prevents time-based attacks with encrypted time sources
Technology: chrony + NTS (Network Time Security)
What it does:
- Configures NTS-authenticated time servers
- Prevents time manipulation attacks
- Ensures certificate validity
- Provides accurate timestamps for logs
Commands:
sudo pbp enable time
pbp scan time
pbp health timePurpose: Blocks DNS hijacking and surveillance
Technology: systemd-resolved + DNS over TLS (DoT)
What it does:
- Encrypts all DNS queries
- Enables DNSSEC validation
- Prevents DNS cache poisoning
- Blocks DNS surveillance
Commands:
sudo pbp enable dns
pbp scan dnsPurpose: Stateful packet filtering with default-deny policy
Technology: nftables
What it does:
- Default drop policy on input
- Stateful connection tracking
- Egress filtering
- Dropped packet logging
Commands:
sudo pbp enable network
pbp scan networkPurpose: Rootless container runtime hardening
Technology: Podman + seccomp
What it does:
- Enforces rootless containers
- Applies seccomp profiles
- Drops unnecessary capabilities
- Validates image signatures
Commands:
sudo pbp enable container
pbp scan containerPurpose: Detects unauthorized system changes
Technology: auditd
What it does:
- Monitors critical files (/etc/passwd, /etc/shadow)
- Tracks privileged commands (sudo, su)
- Logs syscall activity
- Immutable audit rules
Commands:
sudo pbp enable audit
pbp scan auditPurpose: Identifies rootkits and system compromises
Technology: rkhunter + chkrootkit
What it does:
- Scans for rootkits
- Detects hidden processes
- Validates file integrity
- Checks for backdoors
Commands:
sudo pbp enable rootkit
pbp scan rootkitPurpose: Validates network exposure and attack surface
Technology: nmap
What it does:
- Enumerates open ports
- Identifies running services
- Detects insecure protocols
- Maps attack surface
Commands:
sudo pbp enable recon
pbp scan reconUNINSTALLED β install β INSTALLED β enable β ENABLED
β β
βββββββββ rollback βββββ
- UNINSTALLED: Module not installed
- INSTALLED: Packages installed, not configured
- ENABLED: Fully configured and active
- install: Installs required packages
- enable: Applies configuration and starts services
- disable: Stops services, keeps packages
- scan: Runs security scan
- health: Checks module health
- rollback: Reverts to previous configuration
Each module contains:
modules/<name>/
βββ manifest.json # Metadata and configuration
βββ install.sh # Package installation
βββ enable.sh # Configuration and activation
βββ disable.sh # Deactivation
βββ scan.sh # Security scanning
βββ health.sh # Health checks
sudo pbp enable time
sudo pbp enable dns
sudo pbp enable networksudo pbp scanpbp healthsudo pbp rollback networkAll modules are independent - no dependencies between them.