MS SQL Server Instance STIG requires a monitoring process for the software libraries associated with it. It seems odd that there are no apparent OOTB solutions to this problem. This STIG item also appears to be extremely redundant since so many controls are in place before a malicious actor could possibly get to this point. Not to mention that this control does not really provide fidelity on the integrity of the software libraries. Nonetheless, I am attempting to provide a potential solution for those that may Google this issue.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
//https://stackoverflow.com/questions/79591547/unknown-json-stringify-issue | |
if (localStorage.balances == undefined) { | |
localStorage.setItem('balances', '{"ffdbddfaae": "0"}') // initialize balance so JSON doesn't error out | |
} | |
let balances = JSON.parse(localStorage.balances) // convert string to JSON object for further changes | |
let addToBalance = function(value, id) { | |
let key = id.replace(/[0-9]/g, '') // convert alphaumerical id string to only letters to not cause errors when using balances.(id) | |
if (key in balances) { // convert alphaumerical id string to only letters to not cause errors when using balances.(id) and check if id exists in balance object |
If possible, use the module at Import Excel. It'll consider more edge cases.
I wrote this to handle a simple read of somewhat well-formed data in an Excel document like below. It has only been tested in a Windows environment without significant edge-cases considered.
SheetInventory
ID | Title | MyDate | Quantity |
---|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import inspect | |
def Reactive(obj): | |
class ReactiveObject(object): | |
def __init__(self, obj, storage): | |
self.storage = storage | |
self.obj = obj | |
def on_change(self, key, newValue, prevValue): |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Academy of Management Annals/Current/https://journals.aom.org/action/showFeed?type=etoc&feed=rss&jc=annals | |
Academy of Management Annals/Cited/https://journals.aom.org/action/showMostCitedArticlesFeed?journalCode=annals | |
Academy of Management Journal/Current/https://journals.aom.org/action/showFeed?type=etoc&feed=rss&jc=amj | |
Academy of Management Journal/Cited/https://journals.aom.org/action/showMostCitedArticlesFeed?journalCode=amj | |
Academy of Management Perspectives/Current/https://journals.aom.org/action/showFeed?type=etoc&feed=rss&jc=amp | |
Academy of Management Perspectives/Cited/https://journals.aom.org/action/showMostCitedArticlesFeed?journalCode=amp | |
Academy of Management Discoveries/Current/https://journals.aom.org/action/showFeed?type=etoc&feed=rss&jc=amd | |
Academy of Management Discoveries/Cited/https://journals.aom.org/action/showMostCitedArticlesFeed?journalCode=amd | |
Academy of Management Learning & Education/Current/https://journals.aom.org/action/showFeed?type=etoc&feed=rss&jc=amle | |
Academy of Management L |
Faulting application name: lsass.exe, version: 10.0.19041.1266, time stamp: 0x17c94394 Faulting module name: KERNELBASE.dll, version: 10.0.19041.1387, time stamp: 0x0b9a844a Exception code: 0xc000027b Fault offset: 0x000000000010b302 Faulting process id: 0x340 Faulting application start time: 0x01d8035af911766b Faulting application path: C:\Windows\system32\lsass.exe Faulting module path: C:\Windows\System32\KERNELBASE.dll
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$files = Get-ChildItem -Path "Y:\" *.ckl -r | |
$xmls = $files | % {[xml](get-content $_.FullName)} | |
$data = $xmls.Checklist | % { | |
$hostname = $_.Asset.HOST_NAME | |
#Vulns are each checklist item | |
$vulns = $_.STIGS.iSTIG.VULN | |
( $vulns | select @{Name="Host_Name";Expression={$hostname}}, | |
STATUS, | |
@{Name="Vuln_Num"; Expression={$_.STIG_DATA[0].ATTRIBUTE_DATA}}, |
NewerOlder