[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Hidden files



Klaus Ethgen wrote:
> 1. It generates false positives (as mention before). And to many false
>    positives only ends in overlook the real bad files and directories.

Scanning for dotfiles is not an effective way to find files left behind
by exploits. People writing exploits are aware of programs that warn
about dotfiles, and it's easy to find other places to hide troublesome
files. I'd probably use /var/lib/dpkg/info/ on Debian systems if I were
writing an exploit; the high churn rate of new files in that directory
coupled with the absurd number of files in it make it an excellent hiding
place.

> 2. There is absolutely no reason to hide think in this directories. If a
>    programming method use dot files to make there classes and methods
>    private -- no problem. But is it necessary to put them in common
>    paths? I think this is more a misuse. Finished programs should be
>    compiled in some way.

The example I saw was of a dotfile in /usr/lib/something/ not /usr/bin.

-- 
see shy jo

Attachment: signature.asc
Description: Digital signature


Reply to: